last executing test programs: 11m35.806826095s ago: executing program 1 (id=1299): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x400000000000000}, 0x0, 0x8000000, 0xffffffffffffffff, 0x0) 11m35.670311516s ago: executing program 1 (id=1301): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xb, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x27}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20000000, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11m35.583552078s ago: executing program 1 (id=1303): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xd3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r3}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfff, 0xece}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x10}, 0x0, 0xa, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e000000af000000001000000600000007000200", @ANYRES32, @ANYBLOB="a1dc00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000010000000400"/28], 0x50) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000000b00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYRES32=r2, @ANYBLOB='&\x00'/12, @ANYRESHEX=r1, @ANYBLOB="886e327a4e9ed063069e0948ec223fa7594b8995", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000680)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000e00)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024", @ANYRESDEC=r5, @ANYRESOCT, @ANYBLOB="ef543a5bacf3329afe6e65de71a52aa716ef53e209703c597b6696be7196ad80d6597e0d001b31d9438726acd95d8fa008d530520614a875bd3f9986cacaa2f7d7675ae715231888640241c9a9187108041b54d92aba2159341b2b61961aff472a7ba64826b21affdaae3a08cd84614b4035f5cefbecb3d2b8517745e6d9c4243084b0d26400771dd533e55672e24f14cd4b8a9f6639e7c0a74a0a5b40586177838618f4accb2b938ffdfe888de5d1bba1aa5e8f00ea1170ec241a47fbcdfb401b0117fef81df8a82a77003b1d9366ac", @ANYBLOB="3021576084392c41105190723481af7a326729cb308d4078338805ad43eaf4b8b81e972373cb3dc190e56ff45bb264762f46f3c5934fa6a068606baaa73b2c619f678c94084f8ce623e8c5a404fad5443eae68478fe716fdc960b59700ee5cb5be6e11a58f50f81c020fb9f5345339676c0d101f685ece0d57e9770e74c83a47ffee0abd64da99ca0995c2fe2ea1bac8", @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11m34.989266577s ago: executing program 1 (id=1305): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0xfdbc}, 0x26) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11m33.289801363s ago: executing program 2 (id=1323): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x8000000}, 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 11m32.888617739s ago: executing program 0 (id=1326): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11m32.87754623s ago: executing program 0 (id=1327): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x2c}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x2c}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071121400000000009500"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071121400000000009500"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0xd) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0xd) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11m32.731413142s ago: executing program 0 (id=1328): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1000000}, 0xfffffffffffffd00}, 0x48) 11m32.370258088s ago: executing program 2 (id=1329): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xf, &(0x7f0000000480)=@ringbuf, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000800)=""/187, 0xbb}, {&(0x7f00000008c0)=""/80, 0x50}, {&(0x7f0000000ac0)=""/136, 0x88}, {&(0x7f0000000f80)=""/165, 0xa5}, {&(0x7f0000001040)=""/186, 0xba}], 0x5, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000100000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) close(0xffffffffffffffff) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_clone(0x4800b000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m31.786060466s ago: executing program 2 (id=1331): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xf, &(0x7f0000000480)=@ringbuf, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000800)=""/187, 0xbb}, {&(0x7f00000008c0)=""/80, 0x50}, {&(0x7f0000000ac0)=""/136, 0x88}, {&(0x7f0000000f80)=""/165, 0xa5}, {&(0x7f0000001040)=""/186, 0xba}], 0x5, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) close(0xffffffffffffffff) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="180000ffffffd0000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_clone(0x4800b000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m31.703956808s ago: executing program 0 (id=1333): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x4, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="7a0a00ff000000007110720000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000440)='subflow_check_data_avail\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b1"], &(0x7f0000000080)='GPL\x00', 0x4, 0xcb, &(0x7f0000000340)=""/203}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffffff00000000003fd3e2cfb831e3566a4117", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r0, 0x0, 0x8000000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) 11m31.404826952s ago: executing program 0 (id=1334): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1e00000000000000050000000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000e42d206ad0dd577ea42b76000000000000000000000000000000000004"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2767], &(0x7f00000001c0)='GPL\x00'}, 0x48) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000100) recvmsg$unix(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x181) 11m30.90973348s ago: executing program 2 (id=1337): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0xd5, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f00000009c0), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1, 0x9, 0x7, 0x4, 0xe55, 0xffffffffffffffff, 0x1, '\x00', r6, r0, 0x0, 0x2, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{}, &(0x7f0000000700), &(0x7f0000000940)=r2}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000040)="37b697bb0337ccabcd9d6817a571ecc8c04a0a4014faa28929b178ad17284072d86c", 0x22}, {&(0x7f0000000280)="11f4786c0c5a2880d9529ce6bd640b933dcced3c7a941b2c0d4c9519bc27ea68b20efe06817d87510983b9a1a209eb79991978407c552c2babe7b8d8e9593af78fad2f2599d7a490741c7de5f78f632232f2a2b9e6c523d759ccb7397f885339c3cd333d5df8c56cb8a65a35a4db3d72ed02b9623b4f6c9c", 0x78}, {&(0x7f0000000080)="bce9a1500fb68364421550e8d6919dafa0e425ebd56ab1a2c56f8753552caa62a41b96b4326e1af2c3bed02b1d1b4bcff69afcf3eb", 0x35}, {&(0x7f0000000300)="b7d4a52b2af17614456462b15a7e3e00bbe27288c3c0b450043e9af497e3f1a83b7e17dfbf5fdbca8b20df95e23672e68edb0ebd5f4f181bf012c36c66b272ee9dadf949ce81e3703406f61e629308a980ebfc65ea498391952798f6a155c91d", 0x60}, {&(0x7f00000001c0)="882ff5bf20a6ace401ddf2fd4f71dd4c87774ede8621701e4e3f", 0x1a}], 0x5, &(0x7f00000005c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0xbc, 0x0, 0x7, {[@cipso={0x86, 0x37, 0x3, [{0x1, 0x12, "eed23fa1f525782038ba09231695bb77"}, {0x0, 0x5, "69e608"}, {0x1, 0x8, "0acbde78cd41"}, {0x2, 0x12, "cd04e26acac0b1b92071fc4e0071f203"}]}, @rr={0x7, 0xb, 0xff, [@broadcast, @multicast2]}, @timestamp_prespec={0x44, 0x3c, 0xc2, 0x3, 0x0, [{@remote, 0x1}, {@multicast2, 0xa0000}, {@multicast1, 0x5}, {@local, 0x5bec}, {@local, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8802}, {@private=0xa010102, 0x40}]}, @ssrr={0x89, 0xb, 0xf3, [@local, @multicast1]}, @noop, @end, @generic={0x7, 0x11, "3b1590491ecbfe326b46d4d4c1faa3"}, @generic={0x88, 0xf, "1fc4fd3c00b4ab9c272f48a804"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast2, @empty}}}], 0xf8}, 0x40094) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x7}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x2000}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r10, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r11}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r12}, 0x10) 11m30.702785353s ago: executing program 2 (id=1338): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000f900000000000000", @ANYRES32=0x1, @ANYRESHEX=r0, @ANYRES32=0x0], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000002c0)='\x00\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)) (rerun: 64) openat$tun(0xffffffffffffff9c, 0x0, 0x8040, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="2b637075207a8dea94bc0d9b692e"], 0x5) (async) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000004a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000500)='signal_generate\x00', r6}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r8, @ANYRES8=r4, @ANYBLOB="f2de65c3b0d444e9a316451a", @ANYRESOCT], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 11m30.530513126s ago: executing program 2 (id=1339): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0306003c5c980128876340860800702f", @ANYRESHEX=r2, @ANYBLOB="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"], 0xffdd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00)={0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001180)=ANY=[@ANYBLOB="1b000000000000000075e99a1b20000000000000f751cda8a010e09f8f709a84cdf6a68980867f045f651a9b5b11055d423b834ed6811795ebcee584eddd544cfe2fa13a17e7755e179c2d18eba4fc5706483640161c2a234e3680a4b2b40dc41068a7eeb4eb1266c6cabc2188e717dc89025ac0ba2cdb2a46e1a3ed36c6bb261a593770ff192fb63441a71ab31aeb384514207e29fe2122b57258d51ba52f3be591fb77be0bebed5a13f9c3d4aa2d564e543df203", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x19, 0x3, &(0x7f0000000280)=@raw=[@call={0x85, 0x0, 0x0, 0x4f}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000780)='syzkaller\x00', 0x6, 0xa3, &(0x7f00000007c0)=""/163, 0x40f00, 0x0, '\x00', r4, @cgroup_sockopt=0x16, r5, 0x8, &(0x7f0000000940)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x1, 0x2, 0x2}, 0x10, 0x0, r6, 0x4, &(0x7f0000000a40)=[r1, r7], &(0x7f0000000a80)=[{0x0, 0x2, 0x5, 0x7}, {0x5, 0x3, 0xe, 0x8}, {0x2, 0x5, 0x8, 0xc}, {0x0, 0x1, 0xe, 0x4}], 0x10, 0xf}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000013c0)={&(0x7f0000000f80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000000000000100000001008000", @ANYRES32=r3, @ANYRES32=r3], 0x18, 0x4800}, 0x8080) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 11m30.455926877s ago: executing program 32 (id=1339): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0306003c5c980128876340860800702f", @ANYRESHEX=r2, @ANYBLOB="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"], 0xffdd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00)={0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001180)=ANY=[@ANYBLOB="1b000000000000000075e99a1b20000000000000f751cda8a010e09f8f709a84cdf6a68980867f045f651a9b5b11055d423b834ed6811795ebcee584eddd544cfe2fa13a17e7755e179c2d18eba4fc5706483640161c2a234e3680a4b2b40dc41068a7eeb4eb1266c6cabc2188e717dc89025ac0ba2cdb2a46e1a3ed36c6bb261a593770ff192fb63441a71ab31aeb384514207e29fe2122b57258d51ba52f3be591fb77be0bebed5a13f9c3d4aa2d564e543df203", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x19, 0x3, &(0x7f0000000280)=@raw=[@call={0x85, 0x0, 0x0, 0x4f}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000780)='syzkaller\x00', 0x6, 0xa3, &(0x7f00000007c0)=""/163, 0x40f00, 0x0, '\x00', r4, @cgroup_sockopt=0x16, r5, 0x8, &(0x7f0000000940)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x1, 0x2, 0x2}, 0x10, 0x0, r6, 0x4, &(0x7f0000000a40)=[r1, r7], &(0x7f0000000a80)=[{0x0, 0x2, 0x5, 0x7}, {0x5, 0x3, 0xe, 0x8}, {0x2, 0x5, 0x8, 0xc}, {0x0, 0x1, 0xe, 0x4}], 0x10, 0xf}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000013c0)={&(0x7f0000000f80)=@abs={0x1, 0x0, 0x4e20}, 0x6e, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000000000000100000001008000", @ANYRES32=r3, @ANYRES32=r3], 0x18, 0x4800}, 0x8080) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 11m30.446736407s ago: executing program 1 (id=1340): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000804000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11m30.366790168s ago: executing program 1 (id=1341): socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110684}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) recvmsg$unix(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001680)}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x9}, 0x57, 0xc8, 0x0, 0x0, 0x0, 0xad4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) 11m30.273270069s ago: executing program 33 (id=1341): socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110684}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) recvmsg$unix(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001680)}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x9}, 0x57, 0xc8, 0x0, 0x0, 0x0, 0xad4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) 11m30.23028455s ago: executing program 0 (id=1351): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000000000000000000000003146ef536b8ca99aa42e4660a5ec6eb302c321ce7f7b15e09be3da00a319e6a5880ae9e5a4096b179b6d0aa92b832ba1862d06189084f342762b43f34ab47aed43964a24417efa1c45c24638734880adecae4c414f9bdeefaded7e439cd79df8ad678ee6c579ca2404340fff3f388327995edbf9973393c4dc873e39f1d52f0e0fb31cdfaf33f70000042f245420e78da726d0e66312602a967d78e1e55094ad43c4e59f88488b4b5bcb4c3267913ab088fd647e01cec03e2799342063441cc99690fc50045ef94b484507a50a1db1c99ec1efe4aa8c5d5296ca6a97a4b9653be64e3d3096131bfdae4c45947eb1efbb722a5cfbdcb9bfc2940f3e3e4cb566e26e9594a6db77e6d441f22c6183e449ea5feafcd12a5e58b473c59ad1c10d3d750fddd85005843e619e1197d3c4debb790000000000007294d519379914920c4f26498013bbb03bdde32a82aa512706080b78ff353c97f67722ad14397428cc83228d91d38287fd653c6b8dc361f5691276c548ba3ccc0c042e59c9472795ce17ecd7e3774bff7ba6191d48622af4817b252918dfa0af162a3d465c519f6960f9be0bdae6badf0cccdfc6212a30688a36a3e83e33b20c34a52104bd71c77013ec2949e8c18ce9ffa8f3508bd851fb74bcd654d162c0e8beb36254dd187b054a0d35683a3a677adabbe7342796fd9138d84a8c58690cd3a089a58026138a46b9f00a27686de2951fe6ebba35a49b1b6410ceeb32000000000000007f53189443bb8545d8fbb2009deb9e644bdf0c298b2796bfdb08cb2c477eb05178910b8d1b1fe2a0abf825a8ba97ec120bf0a7b296d1b6aba9e4ffb95c92de7e4b0621731c0f3c1b21481930511b384b3204c33e86bf907a29dd9f928f99f6f951ad9b50338aa65955cb8ac4535d75bd5caba37d3755642f9be2cb1effc3387094d1dfacacd0b0bac6c443170d12408dcde338a15ea8d222b16906a8a7406b9ac725c5bb0e53c8dbdd32ff22ef26404db63ce1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x12440, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x7, &(0x7f0000000080)=[{0x7, 0x3, 0x9, 0x9}, {0x4, 0xc, 0x4, 0x1}, {0x2, 0x1, 0x3, 0x40000000}, {0x8, 0x9, 0x4, 0x90}, {0xa, 0x7, 0x8, 0xd}, {0x2, 0x0, 0x0, 0x3}, {0x58c, 0xfd, 0x9, 0x934}]}) close(r0) 11m30.23000421s ago: executing program 34 (id=1351): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x12440, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x7, &(0x7f0000000080)=[{0x7, 0x3, 0x9, 0x9}, {0x4, 0xc, 0x4, 0x1}, {0x2, 0x1, 0x3, 0x40000000}, {0x8, 0x9, 0x4, 0x90}, {0xa, 0x7, 0x8, 0xd}, {0x2, 0x0, 0x0, 0x3}, {0x58c, 0xfd, 0x9, 0x934}]}) close(r0) 11m30.22383671s ago: executing program 5 (id=1349): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0xfdbc}, 0x26) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11m30.183775941s ago: executing program 35 (id=1349): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0xfdbc}, 0x26) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 7.699877481s ago: executing program 8 (id=5900): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/10, 0x2}, 0x20) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYRESDEC=r2, @ANYRES64=r0], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000d00000085000000060000009500000000000000ceef71495b16311894050bff357ce24bd10e33"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) socketpair(0x1e, 0x1, 0x0, 0x0) 6.523103259s ago: executing program 8 (id=5906): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r0, 0x2000012, 0xe, 0x0, &(0x7f0000000500)="8236fca008874827ccf1c8ed1e1f", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="611534000052000061134c0000000000bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350607000fff07206706000002000000160300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000005574d074fa7e93447a88c0fbab48660aae7cdf367ef0e4538279b6113de5b94e1056f443305145c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b70300000000000085000000190000009500000000000022"], &(0x7f0000000000)='GPL\x00', 0x6, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5c}, 0x23) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000ff0d1400bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000bd000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r0, 0x2000012, 0xe, 0x0, &(0x7f0000000500)="8236fca008874827ccf1c8ed1e1f", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b70300000000000085000000190000009500000000000022"], &(0x7f0000000000)='GPL\x00', 0x6, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5c}, 0x23) (async) 6.242019713s ago: executing program 8 (id=5907): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) perf_event_open(&(0x7f0000000a00)={0x1, 0xfffffffffffffff7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x3fa, 0x200, 0x8, 0x7, 0xfffffffe, 0x100}, 0x0, 0xefefffffffefffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000046990000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="850000009c00000095"], &(0x7f0000000180)='GPL\x00', 0x3, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x1c}, 0x94) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/227, 0xe3}], 0x1}, 0x1f00) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB="feb30ac6d6cbd0afa745c8b30a1e729a60fcc55bdf48b41e5f08934ab26b1cdf0e55672e64899ed459050507f24e50396dca43e0501cba2054ea7aa9f0186ea242f89a58bc2b117c0a82c07b81906a3661b7a20d0b261523080a1a57320a55b9", @ANYRES64=0x0], 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000e100732dc92663b0e59fbb264f83c41750ef6e9fa3214dcb96726b18e3c68f72407b4e23a3d05a6db175e33b0655e5600c40e505e120249a70c33358f1c78a27b9ad6cc02fa88a4b077845a9c5914b788b538a1bf6fef121819ea5edf234b877ce4a19082a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) 5.311956928s ago: executing program 8 (id=5914): perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0xf4, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8e4d, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffebe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1000000004000000080000000700000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00e02c7706964400000000000000479d66c124dc6e9c401cc0248f9d9e9569133750bb67cf6718a25784b4bd9511c5d4e4ee"], 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3, 0x10001}}, @volatile={0xe}, @volatile={0xf, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x30, 0x5f, 0x30]}}, &(0x7f0000000780)=""/157, 0x4e, 0x9d, 0x1, 0xfffffffa}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f0000000180)="b302c509b682d3d24428e6a6273c7af9f72049", &(0x7f0000000240)=""/215}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r3}, &(0x7f0000000d80), &(0x7f0000000dc0)=r4}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)='memory.current\x00') r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 5.101124281s ago: executing program 8 (id=5918): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000001000000080000000100000000000000", @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x4, 0x0, 0x0, 0x0, 0x7fef, 0x850c6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xc}, 0x14185, 0x30, 0xfffffc02, 0x8, 0x6, 0x2, 0x7, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) (fail_nth: 100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) 4.367950453s ago: executing program 6 (id=5926): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 4.318912513s ago: executing program 6 (id=5927): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 3.22309053s ago: executing program 3 (id=5933): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d00"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f0000001500)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.165031721s ago: executing program 6 (id=5934): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x2000000000000178, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x14, 0x4, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0xfffffffe, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x22}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x40f00}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000340)=ANY=[@ANYRESDEC=r4, @ANYRES8=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) 3.100676952s ago: executing program 3 (id=5935): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000f623f2035561745561dc3c000000000000002300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000400000000000003000400a2692b0d000000009687a8cb19505b08f1bfe9b9c6cdf6966b8d5b2ebbf0818101df203a67b68543cfcff725e745a34e06dadb3d0bc7a484f99547ecee1fc333eec16a177d4d02eb36e9fcff0c02204899d3db4ea4ad47ba8f59f8f72b6154fe71c9961910651dc74762a22ce2745f7e465ccbfa515260d4898930e1df1b199cbbf7959a0ede038586d62517e41d93eb12bb7b2a595f3644d7dbc97c7256739184834e379be24c971539529e947b47bc77a9f1ad95"], &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000003c0)=[{0x5, 0x1, 0xb, 0xc}, {0x4, 0x5, 0x4, 0x7}, {0x0, 0x2, 0x0, 0x6}, {0x5, 0x5, 0x4, 0xb}, {0x2, 0x5, 0x1, 0xc}, {0x2, 0x4, 0x3, 0x1}, {0x0, 0x2, 0x8, 0xa}], 0x10, 0x45b0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005000100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18080000000000000000000000000fbfbef94e00", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="b9ff030768f1258c989e14f05c71", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r8}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.760727437s ago: executing program 4 (id=5937): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 2.709643897s ago: executing program 4 (id=5938): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed7f000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000020000000000004"], &(0x7f00000015c0)=""/4086, 0x26, 0xff6, 0x1}, 0x20) 2.643130349s ago: executing program 4 (id=5939): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x20000992) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0xcf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa97, 0x3}, 0x0, 0x0, 0x6, 0x4, 0x0, 0xfffff186, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000}, 0x94) 2.417715932s ago: executing program 6 (id=5941): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x6b}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) 2.319227194s ago: executing program 6 (id=5942): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xf, &(0x7f0000000480)=@ringbuf, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000800)=""/187, 0xbb}, {&(0x7f00000008c0)=""/80, 0x50}, {&(0x7f0000000ac0)=""/136, 0x88}, {&(0x7f0000000f80)=""/165, 0xa5}, {&(0x7f0000001040)=""/186, 0xba}], 0x5, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) close(0xffffffffffffffff) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000004000400000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_clone(0x4800b000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.845012671s ago: executing program 6 (id=5943): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() syz_open_procfs$namespace(r3, &(0x7f0000000680)='ns/cgroup\x00') r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={&(0x7f0000000240)="c02243d1e62905480888c82470e97dd35594c51cfa1e10e0e1cd7b70f1755270ecb3f56e59336e8ec5d6803ae35c1cfc170c1bee5bbe", &(0x7f0000000940)=""/252, &(0x7f00000003c0)="604a105609c246f7fc3ec6d5b21a3c07aa94f12b8b868de7723711794ec375ee2cf776fc24f01860f1ce39d226cae4c4aa568c77e8d9cc12759e6de16e54395af011da3b1bb2e2de0baf2b5bf7b5a65041890b1c9377257d58", &(0x7f00000004c0)="cb897ccf6ef22813d27807d1f22cce5867c00958f27621d7031c06cf4a64ba18e86551f4ffd2d9917a766ed97a80745e86128366e25e750f4013794e4deae765c33e947787e679fd411904522e", 0xfff, r4, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x2}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0xfdbc}, 0x26) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000a80)="56f196f4bd52b7edfd1efabb145f614ae73f8e4c22d2b455e1058a579cf86ce8a56f5eb625136d787332913771342fa0beedf0538812798ca7f23e89c968e886f8da2e4ecfc136d10c90601cc7bbb5a8879a24383e9e6b75657f7ead4880ef0ce4a8", 0x62}, {&(0x7f0000000b00)="dbaaaef52e55b56259c085", 0xb}, {&(0x7f0000000b40)="37c632cf1e5e83d38ab5c7ef514353b379855dff87f46fd62841428d13561c90a19cfaf7625bde5d5725ed7155171bdf5ae56a21b1e7c57b0727ce2aeb0c87bb87b972", 0x43}, {&(0x7f0000000bc0)="ae2e3c13fb4f4a937ea1c2035dc815a400c5f87103ecd3261643775e5810c2fd0934cc3e5c5957882a69370be50a7258617e823a054dac997d1a00b73e5945571106c1d559e5000a39430c69ee11c014217aed736c805eccc447dbea4fb9a21ffbd2665844f0101940521111f3eeb4d5c70dc117bf3c3dcecf74a7bfaddc91e85cb0648c06fa4b9addfdd034558de97d1c44ae767c5d56e02c49bc13a54171b469ac5c34d4d7a40346ae213496c6c4d5b090d5b70bc6e709226fd2c42517b1588a208141e8e6a7f70f2dbc8689a8bd4a56f9cfafa6df5042128d86a05042c431", 0xe0}, {&(0x7f0000000cc0)="101a0ea088f58a7110f03451526db89873d8cf4f61c7463b529a1071f271d1979a9ff3a843851f095343ef6e00d3d7410f8b02203dc04df92ac46620071a219dfb8d0abc1d8bd15b5fc4aa04c1", 0x4d}, {&(0x7f0000000d40)="47b5ca32d1089fc8be1e687155b7d68ec34d7e9bf9836480c4f5d2d0cd3d8a0403ee5e372ebd5cc94cc43bf13b2ce96ccd61fa816ee75243dea2cfc3e8fa088e9043b884ab42f3d1455f181099c1c3fdb0bf2a856f4aeb58028a770db344c5eb0a6dc2eaa17e67ce2c1f813c15f415e7c525deb4487720070ecb933e90ae24c1bb951ebee39292d0f3e9eba8c960082ccd23f36c5768d995e6329d8be4eac191b57189a595e863b6ceff154fb089e0c237982dd82a70605c47d7214f549167c309c6c3963aad", 0xc6}, {&(0x7f0000000e80)="7b659ad1d11a011863e5b3f85ed95116", 0x10}, {&(0x7f0000000ec0)="a0482733f15a", 0x6}], 0x8, &(0x7f0000000f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x48, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x34, 0x1, 0x7, [{@remote, 0xbbb}, {@private=0xa010100, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x4}]}, @timestamp_prespec={0x44, 0x1c, 0x5d, 0x3, 0xd, [{@multicast2, 0x4}, {@loopback}, {@private=0xa010100, 0x7fff}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0xa8}, 0x4040) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}, 0x2040014) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, r2, 0x0, 0x0, 0x0}, 0x30) 1.826800541s ago: executing program 7 (id=5944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0x4, 0xe, 0x7, 0x840, 0xffffffffffffffff, 0x4, '\x00', 0x0, r1, 0x5, 0x5, 0x1, 0xd}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="611570000000000061136c0000000000bfa000000000000007000000ee0016055e03010000000000160500000000000069163e0000000000bf07000fff072000260507000fff07206706000020000000140600000ee61860bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 1.804952282s ago: executing program 4 (id=5945): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d002085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f0000001500)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.768851933s ago: executing program 4 (id=5946): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000001000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.710775633s ago: executing program 4 (id=5947): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESHEX=0x0], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x105}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) r1 = gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup, 0xa, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000003000000080002000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="5c000000000000000100000000000000000000040000000000000000"], 0x48) (async) r5 = openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x1000, 0x12) r6 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000240)='tcp_retransmit_synack\x00', r4, 0x0, 0x1}, 0x18) write$cgroup_pid(r6, &(0x7f00000001c0)=r1, 0x12) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000008c0)={&(0x7f0000000700)=@name={0x1e, 0x2, 0x3, {{0x41, 0x2}, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20040041}, 0x8041) sendmsg$tipc(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="45c120cb81cbd317ede9988f3d872f999714e00bcb28bae82f1def046ffeb0abc74bf38ecd4e62307c7a1e874d1ae9ff74755c2f2ac456baf646c8e97becf7df1893e84cfbb5759353482f93de0afa7dd4074d2abb04570673bc30048d26b0a02ad1949cbf5b859385b2d7bcbf0afd1a5d5b8d3077eb27a5a09251d6c0e5a15ba3e2fdde986e3968559d1ee54951229ce1d3e5756b5c79f497ba43d0dd2d3eccde5ff404a557f408c767bd9cff3b4380efe29b69639f2ac0ea40b93edb63a36abc2e49350a992ce587fa3864ca44c4", 0xcf}, {&(0x7f0000000500)="59c84bc4454ac006e5393bfbf56786646a98bf9174b09b32785b903318dab63db1c94df0824f517faf1919818675e358e3be7805db5d19b8575ff74a60aa0872001795c04745729512ccee0546504860a4ab431c00592aea55c4aa603d3f5ab89023956500c727ddc1da351f20d77f7577e59146ddf2f30b8469e539b006e8a75aa61af4201bfe5544a54297aa94cf6a012a7aa129009b9760692018b005902e16285344e3623593d143d3a0b987caea3ed8fefcbef4e173329b0a869ef94eafb1798f4494df77", 0xc7}, {&(0x7f0000000380)="7be7cae3ddfec1d7894908c94f482e7e096e371830653d5f1031ef9d", 0x1c}, {&(0x7f0000000600)="d918c8e46b5445c18e09d414d39f8c0976be57d0c3f8b53c24e4fb1f4099e761686319b7fb32a2d917ea689bd00315f62901e79d9149d78bf687ac509a6ea045acbe3d94a6d69a0bf60f6e321b2ac2548a73706ea9435d2c5de70a2be0ec8abb0b94a160e4e4e67eb01f00b4da29e95178f1d220ee5a71cc66e21a79c1528c53f79eab97b4b01709696797b0a5313e06", 0x90}, {&(0x7f00000006c0)="d69f68aa3be0113aca83f40549d7c50909f5c80973dc71ee", 0x18}], 0x5, &(0x7f0000001340)="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", 0x1000, 0x8010}, 0x4008040) (async) write$cgroup_int(r5, &(0x7f0000000100), 0x12) syz_clone(0x62005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 1.471549917s ago: executing program 3 (id=5948): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 1.390111998s ago: executing program 3 (id=5949): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0x4, 0xe, 0x7, 0x840, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x5, 0x5, 0x1, 0xd}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 1.102635793s ago: executing program 7 (id=5950): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x20, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0xf1}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009000000010000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x8a, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 849.413626ms ago: executing program 7 (id=5951): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, 0x0, 0x0, 0x3be0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r0}, 0x38) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x10) 792.532357ms ago: executing program 3 (id=5952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0x4, 0xe, 0x7, 0x840, 0xffffffffffffffff, 0x4, '\x00', 0x0, r1, 0x5, 0x5, 0x1, 0xd}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="611570000000000061136c0000000000bfa000000000000007000000ee0016055e03010000000000160500000000000069163e0000000000bf07000000001800260507000fff07206706000020000000140600000ee61860bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') 736.076618ms ago: executing program 8 (id=5918): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000001000000080000000100000000000000", @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x4, 0x0, 0x0, 0x0, 0x7fef, 0x850c6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xc}, 0x14185, 0x30, 0xfffffc02, 0x8, 0x6, 0x2, 0x7, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) (fail_nth: 100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) 427.089723ms ago: executing program 7 (id=5953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 388.938073ms ago: executing program 7 (id=5954): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/10, 0x3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000", @ANYRES32, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x4800000}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r1}, 0x38) 17.073299ms ago: executing program 7 (id=5955): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x2, 0xd, 0x9, 0x0, 0x30100, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9}, 0x48) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x8, 0x18}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x9, 0x4, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r2, &(0x7f00000001c0), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) socketpair(0x27, 0x0, 0x1, &(0x7f0000000240)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000001c0), 0x12) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 3 (id=5956): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x20000992) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0xcf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa97, 0x3}, 0x0, 0x0, 0x6, 0x4, 0x0, 0xfffff186, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000}, 0x94) kernel console output (not intermixed with test programs): veth0_to_batadv: link becomes ready [ 252.160337][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.201434][ T4987] device veth1_macvtap entered promiscuous mode [ 252.266811][ T4987] device macsec0 entered promiscuous mode [ 252.366859][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.495691][ T5004] FAULT_INJECTION: forcing a failure. [ 252.495691][ T5004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.509860][ T10] device bridge_slave_1 left promiscuous mode [ 252.517173][ T5004] CPU: 0 PID: 5004 Comm: syz.7.1352 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 252.527002][ T5004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 252.537062][ T5004] Call Trace: [ 252.540345][ T5004] [ 252.543269][ T5004] __dump_stack+0x21/0x24 [ 252.547608][ T5004] dump_stack_lvl+0xee/0x150 [ 252.552211][ T5004] ? __cfi_dump_stack_lvl+0x8/0x8 [ 252.557235][ T5004] ? xas_create+0x618/0x16d0 [ 252.561825][ T5004] ? shmem_add_to_page_cache+0x6d8/0xac0 [ 252.567464][ T5004] dump_stack+0x15/0x24 [ 252.571628][ T5004] should_fail_ex+0x3d4/0x520 [ 252.576306][ T5004] should_fail_alloc_page+0x61/0x90 [ 252.581506][ T5004] prepare_alloc_pages+0x148/0x5f0 [ 252.586622][ T5004] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 252.589739][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.591819][ T5004] __alloc_pages+0x115/0x3a0 [ 252.591840][ T5004] ? __cfi___alloc_pages+0x10/0x10 [ 252.608504][ T5004] ? percpu_counter_add_batch+0x13c/0x160 [ 252.614226][ T5004] __folio_alloc+0x12/0x40 [ 252.618641][ T5004] shmem_alloc_and_acct_folio+0x650/0x870 [ 252.624360][ T5004] ? shmem_replace_folio+0x590/0x590 [ 252.629648][ T5004] ? xas_load+0x39e/0x3b0 [ 252.633981][ T5004] ? __filemap_get_folio+0x93e/0x980 [ 252.639268][ T5004] ? __cfi___filemap_get_folio+0x10/0x10 [ 252.644901][ T5004] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 252.650413][ T5004] ? folio_add_lru+0x260/0x390 [ 252.655184][ T5004] shmem_get_folio_gfp+0x119f/0x2230 [ 252.660484][ T5004] shmem_fallocate+0x7fb/0xc60 [ 252.665265][ T5004] ? __cfi_shmem_fallocate+0x10/0x10 [ 252.670557][ T5004] ? avc_policy_seqno+0x1b/0x70 [ 252.675415][ T5004] ? selinux_file_permission+0x2a5/0x510 [ 252.681052][ T5004] ? fsnotify_perm+0x67/0x5b0 [ 252.685726][ T5004] ? security_file_permission+0x8a/0xb0 [ 252.691267][ T5004] vfs_fallocate+0x4c5/0x5a0 [ 252.695856][ T5004] do_vfs_ioctl+0x1a1d/0x1c80 [ 252.700539][ T5004] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 252.706177][ T5004] ? kstrtouint+0x74/0xe0 [ 252.710523][ T5004] ? ioctl_has_perm+0x391/0x4c0 [ 252.715367][ T5004] ? has_cap_mac_admin+0x330/0x330 [ 252.720468][ T5004] ? security_file_permission+0x94/0xb0 [ 252.726000][ T5004] ? vfs_write+0x9d6/0xca0 [ 252.730400][ T5004] ? slab_free_freelist_hook+0xc2/0x190 [ 252.735932][ T5004] ? selinux_file_ioctl+0x377/0x480 [ 252.741110][ T5004] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 252.746638][ T5004] ? mutex_unlock+0x89/0x220 [ 252.751212][ T5004] ? __cfi_mutex_unlock+0x10/0x10 [ 252.756216][ T5004] ? __fget_files+0x2d5/0x330 [ 252.760877][ T5004] ? security_file_ioctl+0x95/0xc0 [ 252.765967][ T5004] __se_sys_ioctl+0x9f/0x1b0 [ 252.770543][ T5004] __x64_sys_ioctl+0x7b/0x90 [ 252.775127][ T5004] x64_sys_call+0x58b/0x9a0 [ 252.779624][ T5004] do_syscall_64+0x4c/0xa0 [ 252.784024][ T5004] ? clear_bhb_loop+0x30/0x80 [ 252.788694][ T5004] ? clear_bhb_loop+0x30/0x80 [ 252.793360][ T5004] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 252.799236][ T5004] RIP: 0033:0x7f397cd8e929 [ 252.803657][ T5004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.823243][ T5004] RSP: 002b:00007f397dcca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.831639][ T5004] RAX: ffffffffffffffda RBX: 00007f397cfb5fa0 RCX: 00007f397cd8e929 [ 252.839591][ T5004] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000004 [ 252.847542][ T5004] RBP: 00007f397dcca090 R08: 0000000000000000 R09: 0000000000000000 [ 252.855497][ T5004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.863446][ T5004] R13: 0000000000000000 R14: 00007f397cfb5fa0 R15: 00007ffeaa0afa68 [ 252.871405][ T5004] [ 252.875159][ T10] device bridge_slave_0 left promiscuous mode [ 252.881636][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.890401][ T10] device veth1_macvtap left promiscuous mode [ 252.897288][ T10] device veth1_macvtap left promiscuous mode [ 252.903753][ T10] device veth0_vlan left promiscuous mode [ 252.924113][ T10] device veth1_macvtap left promiscuous mode [ 252.948804][ T10] device veth0_vlan left promiscuous mode [ 254.552874][ T5065] syz.3.1369[5065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.552950][ T5065] syz.3.1369[5065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.001060][ T5082] device bridge_slave_0 entered promiscuous mode [ 258.097244][ T5205] syz.4.1416[5205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.097321][ T5205] syz.4.1416[5205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.448604][ T5329] device pim6reg1 entered promiscuous mode [ 263.465237][ T28] audit: type=1400 audit(1751750508.654:140): avc: denied { create } for pid=5349 comm="syz.8.1461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 264.172217][ T5384] FAULT_INJECTION: forcing a failure. [ 264.172217][ T5384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 264.271221][ T5384] CPU: 0 PID: 5384 Comm: syz.6.1469 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 264.281069][ T5384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 264.291132][ T5384] Call Trace: [ 264.294413][ T5384] [ 264.297337][ T5384] __dump_stack+0x21/0x24 [ 264.301678][ T5384] dump_stack_lvl+0xee/0x150 [ 264.306282][ T5384] ? __cfi_dump_stack_lvl+0x8/0x8 [ 264.311339][ T5384] ? copy_from_user_nofault+0xe3/0x140 [ 264.316810][ T5384] dump_stack+0x15/0x24 [ 264.320972][ T5384] should_fail_ex+0x3d4/0x520 [ 264.325648][ T5384] should_fail_alloc_page+0x61/0x90 [ 264.331064][ T5384] prepare_alloc_pages+0x148/0x5f0 [ 264.336190][ T5384] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 264.341410][ T5384] __alloc_pages+0x115/0x3a0 [ 264.346008][ T5384] ? __cfi___alloc_pages+0x10/0x10 [ 264.351126][ T5384] ? percpu_counter_add_batch+0x13c/0x160 [ 264.356846][ T5384] __folio_alloc+0x12/0x40 [ 264.361262][ T5384] shmem_alloc_and_acct_folio+0x650/0x870 [ 264.366991][ T5384] ? shmem_replace_folio+0x590/0x590 [ 264.372279][ T5384] ? xas_load+0x39e/0x3b0 [ 264.376607][ T5384] ? __filemap_get_folio+0x93e/0x980 [ 264.381891][ T5384] ? __cfi___filemap_get_folio+0x10/0x10 [ 264.387531][ T5384] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 264.392995][ T5384] ? folio_add_lru+0x260/0x390 [ 264.397763][ T5384] shmem_get_folio_gfp+0x119f/0x2230 [ 264.403057][ T5384] shmem_fallocate+0x7fb/0xc60 [ 264.407825][ T5384] ? __cfi_shmem_fallocate+0x10/0x10 [ 264.413109][ T5384] ? avc_policy_seqno+0x1b/0x70 [ 264.417953][ T5384] ? selinux_file_permission+0x2a5/0x510 [ 264.423575][ T5384] ? fsnotify_perm+0x67/0x5b0 [ 264.428233][ T5384] ? security_file_permission+0x8a/0xb0 [ 264.433760][ T5384] vfs_fallocate+0x4c5/0x5a0 [ 264.438332][ T5384] do_vfs_ioctl+0x1a1d/0x1c80 [ 264.442993][ T5384] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 264.448611][ T5384] ? kstrtouint+0x74/0xe0 [ 264.452927][ T5384] ? ioctl_has_perm+0x391/0x4c0 [ 264.457778][ T5384] ? has_cap_mac_admin+0x330/0x330 [ 264.462869][ T5384] ? security_file_permission+0x94/0xb0 [ 264.468394][ T5384] ? vfs_write+0x9d6/0xca0 [ 264.472792][ T5384] ? slab_free_freelist_hook+0xc2/0x190 [ 264.478322][ T5384] ? selinux_file_ioctl+0x377/0x480 [ 264.483499][ T5384] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 264.489028][ T5384] ? mutex_unlock+0x89/0x220 [ 264.493596][ T5384] ? __cfi_mutex_unlock+0x10/0x10 [ 264.498601][ T5384] ? __fget_files+0x2d5/0x330 [ 264.503264][ T5384] ? security_file_ioctl+0x95/0xc0 [ 264.508355][ T5384] __se_sys_ioctl+0x9f/0x1b0 [ 264.512930][ T5384] __x64_sys_ioctl+0x7b/0x90 [ 264.517507][ T5384] x64_sys_call+0x58b/0x9a0 [ 264.521992][ T5384] do_syscall_64+0x4c/0xa0 [ 264.526386][ T5384] ? clear_bhb_loop+0x30/0x80 [ 264.531044][ T5384] ? clear_bhb_loop+0x30/0x80 [ 264.535714][ T5384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 264.541603][ T5384] RIP: 0033:0x7fb53e58e929 [ 264.546004][ T5384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.565600][ T5384] RSP: 002b:00007fb53f368038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.573995][ T5384] RAX: ffffffffffffffda RBX: 00007fb53e7b5fa0 RCX: 00007fb53e58e929 [ 264.581947][ T5384] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000004 [ 264.589901][ T5384] RBP: 00007fb53f368090 R08: 0000000000000000 R09: 0000000000000000 [ 264.597918][ T5384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 264.605923][ T5384] R13: 0000000000000000 R14: 00007fb53e7b5fa0 R15: 00007fff160753b8 [ 264.613897][ T5384] [ 265.976092][ T5411] FAULT_INJECTION: forcing a failure. [ 265.976092][ T5411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 266.351180][ T5411] CPU: 0 PID: 5411 Comm: syz.8.1477 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 266.361030][ T5411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 266.371078][ T5411] Call Trace: [ 266.374350][ T5411] [ 266.377271][ T5411] __dump_stack+0x21/0x24 [ 266.381603][ T5411] dump_stack_lvl+0xee/0x150 [ 266.386193][ T5411] ? __cfi_dump_stack_lvl+0x8/0x8 [ 266.391224][ T5411] ? migrate_enable+0x19c/0x280 [ 266.396123][ T5411] dump_stack+0x15/0x24 [ 266.400303][ T5411] should_fail_ex+0x3d4/0x520 [ 266.404989][ T5411] should_fail+0xb/0x10 [ 266.409154][ T5411] should_fail_usercopy+0x1a/0x20 [ 266.414181][ T5411] _copy_from_user+0x1e/0xc0 [ 266.418767][ T5411] generic_map_update_batch+0x458/0x780 [ 266.424308][ T5411] ? irqentry_exit+0x37/0x40 [ 266.428896][ T5411] ? __cfi_generic_map_update_batch+0x10/0x10 [ 266.434960][ T5411] ? __fdget+0x19c/0x220 [ 266.439201][ T5411] ? __cfi_generic_map_update_batch+0x10/0x10 [ 266.445263][ T5411] bpf_map_do_batch+0x48c/0x620 [ 266.450107][ T5411] __sys_bpf+0x624/0x780 [ 266.454356][ T5411] ? bpf_link_show_fdinfo+0x320/0x320 [ 266.459747][ T5411] ? __cfi_sched_clock_cpu+0x10/0x10 [ 266.465041][ T5411] __x64_sys_bpf+0x7c/0x90 [ 266.469462][ T5411] x64_sys_call+0x488/0x9a0 [ 266.473965][ T5411] do_syscall_64+0x4c/0xa0 [ 266.478377][ T5411] ? clear_bhb_loop+0x30/0x80 [ 266.483050][ T5411] ? clear_bhb_loop+0x30/0x80 [ 266.487724][ T5411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 266.493612][ T5411] RIP: 0033:0x7fba4198e929 [ 266.498018][ T5411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.517622][ T5411] RSP: 002b:00007fba4289e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 266.526046][ T5411] RAX: ffffffffffffffda RBX: 00007fba41bb5fa0 RCX: 00007fba4198e929 [ 266.534019][ T5411] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 266.541986][ T5411] RBP: 00007fba4289e090 R08: 0000000000000000 R09: 0000000000000000 [ 266.549952][ T5411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 266.557916][ T5411] R13: 0000000000000000 R14: 00007fba41bb5fa0 R15: 00007ffcb6123c68 [ 266.565886][ T5411] [ 269.398092][ T5479] syz.8.1495[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.398166][ T5479] syz.8.1495[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.612449][ T28] audit: type=1400 audit(1751750516.804:141): avc: denied { create } for pid=5538 comm="syz.7.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 275.862097][ T5662] pim6reg1: tun_chr_ioctl cmd 1074025673 [ 276.061233][ T28] audit: type=1400 audit(1751750521.254:142): avc: denied { create } for pid=5660 comm="syz.3.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 276.326545][ T28] audit: type=1400 audit(1751750521.354:143): avc: denied { create } for pid=5660 comm="syz.3.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 277.707891][ T5727] syz.4.1573[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.707964][ T5727] syz.4.1573[5727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.964590][ T5779] device pim6reg1 entered promiscuous mode [ 281.462604][ T28] audit: type=1400 audit(1751750526.654:144): avc: denied { read } for pid=5817 comm="syz.3.1600" dev="nsfs" ino=4026532542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 281.523618][ T28] audit: type=1400 audit(1751750526.654:145): avc: denied { open } for pid=5817 comm="syz.3.1600" path="cgroup:[4026532542]" dev="nsfs" ino=4026532542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.764783][ T5932] device veth0_vlan left promiscuous mode [ 285.883730][ T5932] device veth0_vlan entered promiscuous mode [ 286.902904][ T5958] device wg2 entered promiscuous mode [ 288.128474][ T5978] device pim6reg1 entered promiscuous mode [ 288.423548][ T5989] FAULT_INJECTION: forcing a failure. [ 288.423548][ T5989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.437000][ T5989] CPU: 0 PID: 5989 Comm: syz.4.1652 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 288.446813][ T5989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 288.456864][ T5989] Call Trace: [ 288.460137][ T5989] [ 288.463058][ T5989] __dump_stack+0x21/0x24 [ 288.467388][ T5989] dump_stack_lvl+0xee/0x150 [ 288.471972][ T5989] ? __cfi_dump_stack_lvl+0x8/0x8 [ 288.476983][ T5989] dump_stack+0x15/0x24 [ 288.481121][ T5989] should_fail_ex+0x3d4/0x520 [ 288.485782][ T5989] should_fail_alloc_page+0x61/0x90 [ 288.490962][ T5989] prepare_alloc_pages+0x148/0x5f0 [ 288.496056][ T5989] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 288.501235][ T5989] __alloc_pages+0x115/0x3a0 [ 288.505808][ T5989] ? __cfi___alloc_pages+0x10/0x10 [ 288.510904][ T5989] ? percpu_counter_add_batch+0x13c/0x160 [ 288.516617][ T5989] __folio_alloc+0x12/0x40 [ 288.521018][ T5989] shmem_alloc_and_acct_folio+0x650/0x870 [ 288.526719][ T5989] ? shmem_replace_folio+0x590/0x590 [ 288.532070][ T5989] ? xas_load+0x39e/0x3b0 [ 288.536398][ T5989] ? __filemap_get_folio+0x93e/0x980 [ 288.541681][ T5989] ? __cfi___filemap_get_folio+0x10/0x10 [ 288.547319][ T5989] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 288.552767][ T5989] ? folio_add_lru+0x260/0x390 [ 288.557510][ T5989] shmem_get_folio_gfp+0x119f/0x2230 [ 288.562780][ T5989] shmem_fallocate+0x7fb/0xc60 [ 288.567527][ T5989] ? __cfi_shmem_fallocate+0x10/0x10 [ 288.572793][ T5989] ? avc_policy_seqno+0x1b/0x70 [ 288.577628][ T5989] ? selinux_file_permission+0x2a5/0x510 [ 288.583241][ T5989] ? fsnotify_perm+0x67/0x5b0 [ 288.587896][ T5989] ? security_file_permission+0x8a/0xb0 [ 288.593424][ T5989] vfs_fallocate+0x4c5/0x5a0 [ 288.597997][ T5989] do_vfs_ioctl+0x1a1d/0x1c80 [ 288.602659][ T5989] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 288.608274][ T5989] ? kstrtouint+0x74/0xe0 [ 288.612588][ T5989] ? ioctl_has_perm+0x391/0x4c0 [ 288.617420][ T5989] ? has_cap_mac_admin+0x330/0x330 [ 288.622509][ T5989] ? security_file_permission+0x94/0xb0 [ 288.628032][ T5989] ? vfs_write+0x9d6/0xca0 [ 288.632433][ T5989] ? slab_free_freelist_hook+0xc2/0x190 [ 288.637965][ T5989] ? selinux_file_ioctl+0x377/0x480 [ 288.643142][ T5989] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 288.648667][ T5989] ? mutex_unlock+0x89/0x220 [ 288.653240][ T5989] ? __cfi_mutex_unlock+0x10/0x10 [ 288.658245][ T5989] ? __fget_files+0x2d5/0x330 [ 288.662909][ T5989] ? security_file_ioctl+0x95/0xc0 [ 288.667999][ T5989] __se_sys_ioctl+0x9f/0x1b0 [ 288.672574][ T5989] __x64_sys_ioctl+0x7b/0x90 [ 288.677148][ T5989] x64_sys_call+0x58b/0x9a0 [ 288.681633][ T5989] do_syscall_64+0x4c/0xa0 [ 288.686028][ T5989] ? clear_bhb_loop+0x30/0x80 [ 288.690686][ T5989] ? clear_bhb_loop+0x30/0x80 [ 288.695343][ T5989] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 288.701215][ T5989] RIP: 0033:0x7fcfe418e929 [ 288.705609][ T5989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.725194][ T5989] RSP: 002b:00007fcfe500b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.733591][ T5989] RAX: ffffffffffffffda RBX: 00007fcfe43b5fa0 RCX: 00007fcfe418e929 [ 288.741543][ T5989] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000004 [ 288.749495][ T5989] RBP: 00007fcfe500b090 R08: 0000000000000000 R09: 0000000000000000 [ 288.757447][ T5989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.765400][ T5989] R13: 0000000000000000 R14: 00007fcfe43b5fa0 R15: 00007ffd8a1a1ef8 [ 288.773363][ T5989] [ 289.071542][ T6008] syz.3.1656[6008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.071615][ T6008] syz.3.1656[6008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.101011][ T6009] syz.3.1656[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.124266][ T6009] syz.3.1656[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.121749][ T28] audit: type=1400 audit(1751750535.294:146): avc: denied { create } for pid=6040 comm="syz.4.1668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 290.494424][ T6066] syz.3.1676[6066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.494497][ T6066] syz.3.1676[6066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.601917][ T6090] device wg2 entered promiscuous mode [ 294.095472][ T6154] device sit0 left promiscuous mode [ 297.977448][ T6243] FAULT_INJECTION: forcing a failure. [ 297.977448][ T6243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.152931][ T6243] CPU: 1 PID: 6243 Comm: syz.3.1732 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 298.162778][ T6243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 298.172832][ T6243] Call Trace: [ 298.176118][ T6243] [ 298.179042][ T6243] __dump_stack+0x21/0x24 [ 298.183376][ T6243] dump_stack_lvl+0xee/0x150 [ 298.187967][ T6243] ? __cfi_dump_stack_lvl+0x8/0x8 [ 298.192991][ T6243] dump_stack+0x15/0x24 [ 298.197149][ T6243] should_fail_ex+0x3d4/0x520 [ 298.201829][ T6243] should_fail+0xb/0x10 [ 298.205978][ T6243] should_fail_usercopy+0x1a/0x20 [ 298.210998][ T6243] _copy_to_user+0x1e/0x90 [ 298.215411][ T6243] __htab_map_lookup_and_delete_batch+0x1b8c/0x2070 [ 298.222006][ T6243] ? lookup_nulls_elem_raw+0x160/0x160 [ 298.227469][ T6243] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 298.233625][ T6243] htab_map_lookup_and_delete_batch+0x30/0x40 [ 298.239693][ T6243] ? __cfi_htab_map_lookup_and_delete_batch+0x10/0x10 [ 298.246449][ T6243] bpf_map_do_batch+0x48c/0x620 [ 298.251297][ T6243] __sys_bpf+0x624/0x780 [ 298.255539][ T6243] ? bpf_link_show_fdinfo+0x320/0x320 [ 298.260918][ T6243] ? __cfi_sched_clock_cpu+0x10/0x10 [ 298.266212][ T6243] __x64_sys_bpf+0x7c/0x90 [ 298.270631][ T6243] x64_sys_call+0x488/0x9a0 [ 298.275131][ T6243] do_syscall_64+0x4c/0xa0 [ 298.279546][ T6243] ? clear_bhb_loop+0x30/0x80 [ 298.284221][ T6243] ? clear_bhb_loop+0x30/0x80 [ 298.288890][ T6243] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 298.294774][ T6243] RIP: 0033:0x7fbd0f18e929 [ 298.299187][ T6243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.318786][ T6243] RSP: 002b:00007fbd0ffee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 298.327197][ T6243] RAX: ffffffffffffffda RBX: 00007fbd0f3b6080 RCX: 00007fbd0f18e929 [ 298.335167][ T6243] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 298.343141][ T6243] RBP: 00007fbd0ffee090 R08: 0000000000000000 R09: 0000000000000000 [ 298.351117][ T6243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.359079][ T6243] R13: 0000000000000000 R14: 00007fbd0f3b6080 R15: 00007ffc5b3cb348 [ 298.367050][ T6243] [ 299.511198][ T6278] bond_slave_1: mtu less than device minimum [ 302.100998][ T6341] syz.6.1762[6341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.101073][ T6341] syz.6.1762[6341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.071445][ T6352] device veth0_vlan left promiscuous mode [ 303.193341][ T6352] device veth0_vlan entered promiscuous mode [ 303.252895][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.276237][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.354864][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.876545][ T6384] device syzkaller0 entered promiscuous mode [ 312.526117][ T28] audit: type=1400 audit(1751750557.694:147): avc: denied { create } for pid=6570 comm="syz.6.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 312.644215][ T28] audit: type=1400 audit(1751750557.824:148): avc: denied { ioctl } for pid=6582 comm="syz.3.1836" path="socket:[35359]" dev="sockfs" ino=35359 ioctlcmd=0x54d0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 313.352194][ T6605] FAULT_INJECTION: forcing a failure. [ 313.352194][ T6605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.559746][ T6605] CPU: 1 PID: 6605 Comm: syz.7.1842 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 313.569588][ T6605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 313.579626][ T6605] Call Trace: [ 313.582890][ T6605] [ 313.585802][ T6605] __dump_stack+0x21/0x24 [ 313.590117][ T6605] dump_stack_lvl+0xee/0x150 [ 313.594692][ T6605] ? __cfi_dump_stack_lvl+0x8/0x8 [ 313.599698][ T6605] ? xas_create+0x618/0x16d0 [ 313.604265][ T6605] ? shmem_add_to_page_cache+0x6d8/0xac0 [ 313.609878][ T6605] dump_stack+0x15/0x24 [ 313.614015][ T6605] should_fail_ex+0x3d4/0x520 [ 313.618675][ T6605] should_fail_alloc_page+0x61/0x90 [ 313.623854][ T6605] prepare_alloc_pages+0x148/0x5f0 [ 313.628948][ T6605] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 313.634129][ T6605] __alloc_pages+0x115/0x3a0 [ 313.638699][ T6605] ? __cfi___alloc_pages+0x10/0x10 [ 313.643792][ T6605] ? percpu_counter_add_batch+0x13c/0x160 [ 313.649495][ T6605] __folio_alloc+0x12/0x40 [ 313.653891][ T6605] shmem_alloc_and_acct_folio+0x650/0x870 [ 313.659591][ T6605] ? shmem_replace_folio+0x590/0x590 [ 313.664862][ T6605] ? xas_load+0x39e/0x3b0 [ 313.669173][ T6605] ? __filemap_get_folio+0x93e/0x980 [ 313.674443][ T6605] ? __cfi___filemap_get_folio+0x10/0x10 [ 313.680058][ T6605] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 313.685503][ T6605] ? folio_add_lru+0x260/0x390 [ 313.690254][ T6605] shmem_get_folio_gfp+0x119f/0x2230 [ 313.695524][ T6605] shmem_fallocate+0x7fb/0xc60 [ 313.700275][ T6605] ? __cfi_shmem_fallocate+0x10/0x10 [ 313.705543][ T6605] ? avc_policy_seqno+0x1b/0x70 [ 313.710377][ T6605] ? selinux_file_permission+0x2a5/0x510 [ 313.715991][ T6605] ? fsnotify_perm+0x67/0x5b0 [ 313.720651][ T6605] ? security_file_permission+0x8a/0xb0 [ 313.726180][ T6605] vfs_fallocate+0x4c5/0x5a0 [ 313.730755][ T6605] do_vfs_ioctl+0x1a1d/0x1c80 [ 313.735418][ T6605] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 313.741035][ T6605] ? kstrtouint+0x74/0xe0 [ 313.745356][ T6605] ? ioctl_has_perm+0x391/0x4c0 [ 313.750190][ T6605] ? has_cap_mac_admin+0x330/0x330 [ 313.755281][ T6605] ? security_file_permission+0x94/0xb0 [ 313.760821][ T6605] ? vfs_write+0x9d6/0xca0 [ 313.765220][ T6605] ? slab_free_freelist_hook+0xc2/0x190 [ 313.770750][ T6605] ? selinux_file_ioctl+0x377/0x480 [ 313.775928][ T6605] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 313.781450][ T6605] ? mutex_unlock+0x89/0x220 [ 313.786022][ T6605] ? __cfi_mutex_unlock+0x10/0x10 [ 313.791025][ T6605] ? __fget_files+0x2d5/0x330 [ 313.795687][ T6605] ? security_file_ioctl+0x95/0xc0 [ 313.800779][ T6605] __se_sys_ioctl+0x9f/0x1b0 [ 313.805355][ T6605] __x64_sys_ioctl+0x7b/0x90 [ 313.809932][ T6605] x64_sys_call+0x58b/0x9a0 [ 313.814417][ T6605] do_syscall_64+0x4c/0xa0 [ 313.818812][ T6605] ? clear_bhb_loop+0x30/0x80 [ 313.823470][ T6605] ? clear_bhb_loop+0x30/0x80 [ 313.828127][ T6605] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 313.834002][ T6605] RIP: 0033:0x7f397cd8e929 [ 313.838397][ T6605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.857982][ T6605] RSP: 002b:00007f397dcca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.866381][ T6605] RAX: ffffffffffffffda RBX: 00007f397cfb5fa0 RCX: 00007f397cd8e929 [ 313.874339][ T6605] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000004 [ 313.882294][ T6605] RBP: 00007f397dcca090 R08: 0000000000000000 R09: 0000000000000000 [ 313.890248][ T6605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 313.898198][ T6605] R13: 0000000000000000 R14: 00007f397cfb5fa0 R15: 00007ffeaa0afa68 [ 313.906160][ T6605] [ 314.322554][ T6624] device pim6reg1 entered promiscuous mode [ 316.018236][ T6669] syz.7.1862[6669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.018309][ T6669] syz.7.1862[6669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.977650][ T6697] device veth0_vlan left promiscuous mode [ 318.044411][ T6697] device veth0_vlan entered promiscuous mode [ 318.056475][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.065021][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.098585][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.348568][ T6727] device sit0 entered promiscuous mode [ 323.408953][ T6844] FAULT_INJECTION: forcing a failure. [ 323.408953][ T6844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.610966][ T6844] CPU: 1 PID: 6844 Comm: syz.6.1917 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 323.620820][ T6844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.630874][ T6844] Call Trace: [ 323.634148][ T6844] [ 323.637077][ T6844] __dump_stack+0x21/0x24 [ 323.641409][ T6844] dump_stack_lvl+0xee/0x150 [ 323.645999][ T6844] ? __cfi_dump_stack_lvl+0x8/0x8 [ 323.651025][ T6844] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 323.657174][ T6844] dump_stack+0x15/0x24 [ 323.661333][ T6844] should_fail_ex+0x3d4/0x520 [ 323.666055][ T6844] should_fail+0xb/0x10 [ 323.670208][ T6844] should_fail_usercopy+0x1a/0x20 [ 323.675231][ T6844] _copy_to_user+0x1e/0x90 [ 323.679647][ T6844] __htab_map_lookup_and_delete_batch+0x1bf5/0x2070 [ 323.686257][ T6844] ? lookup_nulls_elem_raw+0x160/0x160 [ 323.691720][ T6844] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 323.697878][ T6844] ? __cfi_htab_map_lookup_and_delete_batch+0x10/0x10 [ 323.704640][ T6844] htab_map_lookup_and_delete_batch+0x30/0x40 [ 323.710703][ T6844] ? __cfi_htab_map_lookup_and_delete_batch+0x10/0x10 [ 323.717461][ T6844] bpf_map_do_batch+0x48c/0x620 [ 323.722312][ T6844] __sys_bpf+0x624/0x780 [ 323.726556][ T6844] ? bpf_link_show_fdinfo+0x320/0x320 [ 323.731937][ T6844] ? irqentry_exit+0x37/0x40 [ 323.736530][ T6844] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 323.742340][ T6844] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 323.748494][ T6844] __x64_sys_bpf+0x7c/0x90 [ 323.752914][ T6844] x64_sys_call+0x488/0x9a0 [ 323.757411][ T6844] do_syscall_64+0x4c/0xa0 [ 323.761826][ T6844] ? clear_bhb_loop+0x30/0x80 [ 323.766497][ T6844] ? clear_bhb_loop+0x30/0x80 [ 323.771169][ T6844] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 323.777059][ T6844] RIP: 0033:0x7fb53e58e929 [ 323.781471][ T6844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.801080][ T6844] RSP: 002b:00007fb53f368038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 323.809496][ T6844] RAX: ffffffffffffffda RBX: 00007fb53e7b5fa0 RCX: 00007fb53e58e929 [ 323.817462][ T6844] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 323.825429][ T6844] RBP: 00007fb53f368090 R08: 0000000000000000 R09: 0000000000000000 [ 323.833393][ T6844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.841357][ T6844] R13: 0000000000000000 R14: 00007fb53e7b5fa0 R15: 00007fff160753b8 [ 323.849337][ T6844] [ 324.121706][ T6871] device sit0 entered promiscuous mode [ 324.189092][ T6862] device sit0 left promiscuous mode [ 327.233848][ T6945] syz.7.1947[6945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.233921][ T6945] syz.7.1947[6945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.428443][ T6955] device wg2 left promiscuous mode [ 332.662608][ T7125] bridge0: port 3(veth1_macvtap) entered blocking state [ 332.697969][ T7125] bridge0: port 3(veth1_macvtap) entered disabled state [ 332.808865][ T7126] bridge0: port 3(veth1_macvtap) entered blocking state [ 332.931633][ T7126] bridge0: port 3(veth1_macvtap) entered disabled state [ 349.811994][ T7432] device syzkaller0 entered promiscuous mode [ 352.661697][ T7492] syz.7.2089[7492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.661772][ T7492] syz.7.2089[7492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.538640][ T7618] device sit0 entered promiscuous mode [ 359.414044][ T4972] cgroup: fork rejected by pids controller in /syz7 [ 360.907127][ T10] device bridge_slave_1 left promiscuous mode [ 360.915580][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.966877][ T10] device bridge_slave_0 left promiscuous mode [ 361.003996][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.057177][ T10] device veth1_macvtap left promiscuous mode [ 361.094052][ T10] device veth0_vlan left promiscuous mode [ 361.189447][ T7649] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.196572][ T7649] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.204022][ T7649] device bridge_slave_0 entered promiscuous mode [ 361.211286][ T7649] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.218315][ T7649] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.225859][ T7649] device bridge_slave_1 entered promiscuous mode [ 361.236201][ T7674] device sit0 entered promiscuous mode [ 362.283584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.301364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.334628][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.405585][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.490910][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.497988][ T1823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.621090][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.717795][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.818143][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.908978][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.916068][ T1823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.990684][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.999042][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.152361][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.233821][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.303890][ T7649] device veth0_vlan entered promiscuous mode [ 363.312760][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.395370][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.421381][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.429677][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.438135][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.445824][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.544078][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.564064][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.666013][ T7649] device veth1_macvtap entered promiscuous mode [ 363.843151][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.888024][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.048739][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.201820][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.278059][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.128732][ T7768] device veth1_macvtap left promiscuous mode [ 365.134869][ T7768] device macsec0 entered promiscuous mode [ 367.097009][ T7828] syz.6.2189[7828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.097083][ T7828] syz.6.2189[7828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.465301][ T7857] device syzkaller0 entered promiscuous mode [ 369.789649][ T28] audit: type=1400 audit(1751750614.974:149): avc: denied { create } for pid=7905 comm="syz.7.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 370.254150][ T7912] FAULT_INJECTION: forcing a failure. [ 370.254150][ T7912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.334532][ T7912] CPU: 1 PID: 7912 Comm: syz.6.2214 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 370.344378][ T7912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 370.354439][ T7912] Call Trace: [ 370.357715][ T7912] [ 370.360640][ T7912] __dump_stack+0x21/0x24 [ 370.364976][ T7912] dump_stack_lvl+0xee/0x150 [ 370.369567][ T7912] ? __cfi_dump_stack_lvl+0x8/0x8 [ 370.374589][ T7912] ? __kmalloc_node+0x125/0x1e0 [ 370.379450][ T7912] dump_stack+0x15/0x24 [ 370.383604][ T7912] should_fail_ex+0x3d4/0x520 [ 370.388283][ T7912] should_fail+0xb/0x10 [ 370.392431][ T7912] should_fail_usercopy+0x1a/0x20 [ 370.397450][ T7912] _copy_to_user+0x1e/0x90 [ 370.401850][ T7912] __htab_map_lookup_and_delete_batch+0x1bf5/0x2070 [ 370.408432][ T7912] ? lookup_nulls_elem_raw+0x160/0x160 [ 370.413870][ T7912] ? __fget_files+0x2d5/0x330 [ 370.418534][ T7912] htab_map_lookup_and_delete_batch+0x30/0x40 [ 370.424670][ T7912] ? __cfi_htab_map_lookup_and_delete_batch+0x10/0x10 [ 370.431412][ T7912] bpf_map_do_batch+0x48c/0x620 [ 370.436243][ T7912] __sys_bpf+0x624/0x780 [ 370.440470][ T7912] ? bpf_link_show_fdinfo+0x320/0x320 [ 370.445827][ T7912] ? __cfi_ksys_write+0x10/0x10 [ 370.450660][ T7912] ? debug_smp_processor_id+0x17/0x20 [ 370.456015][ T7912] __x64_sys_bpf+0x7c/0x90 [ 370.460414][ T7912] x64_sys_call+0x488/0x9a0 [ 370.464901][ T7912] do_syscall_64+0x4c/0xa0 [ 370.469296][ T7912] ? clear_bhb_loop+0x30/0x80 [ 370.473955][ T7912] ? clear_bhb_loop+0x30/0x80 [ 370.478611][ T7912] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 370.484481][ T7912] RIP: 0033:0x7fb53e58e929 [ 370.488874][ T7912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.508469][ T7912] RSP: 002b:00007fb53f368038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.516875][ T7912] RAX: ffffffffffffffda RBX: 00007fb53e7b5fa0 RCX: 00007fb53e58e929 [ 370.524831][ T7912] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 370.532783][ T7912] RBP: 00007fb53f368090 R08: 0000000000000000 R09: 0000000000000000 [ 370.540736][ T7912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.548687][ T7912] R13: 0000000000000000 R14: 00007fb53e7b5fa0 R15: 00007fff160753b8 [ 370.556641][ T7912] [ 371.173457][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.182858][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.441783][ T7934] device bridge_slave_1 left promiscuous mode [ 371.447959][ T7934] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.578884][ T7934] device bridge_slave_0 left promiscuous mode [ 371.664920][ T7934] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.353664][ T7970] device syzkaller0 entered promiscuous mode [ 374.532025][ T309] syzkaller0: tun_net_xmit 76 [ 374.536811][ T309] syzkaller0: tun_net_xmit 48 [ 374.580171][ T309] syzkaller0: tun_net_xmit 76 [ 374.584975][ T7975] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 374.632637][ T7975] syzkaller0: Linktype set failed because interface is up [ 374.680895][ T309] syzkaller0: tun_net_xmit 76 [ 374.750581][ T295] syzkaller0: tun_net_xmit 76 [ 375.570284][ T8003] device syzkaller0 entered promiscuous mode [ 377.084199][ T28] audit: type=1400 audit(1751750622.274:150): avc: denied { create } for pid=8037 comm="syz.4.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 380.349053][ T28] audit: type=1400 audit(1751750625.534:151): avc: denied { create } for pid=8054 comm="syz.7.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 381.793999][ T8078] syz.7.2264[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.794072][ T8078] syz.7.2264[8078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.276617][ T8093] device syzkaller0 entered promiscuous mode [ 383.357708][ T8109] device syzkaller0 entered promiscuous mode [ 384.049291][ T8124] device syzkaller0 entered promiscuous mode [ 384.468960][ T8142] device veth0_vlan left promiscuous mode [ 384.510908][ T8142] device veth0_vlan entered promiscuous mode [ 384.756988][ T8142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.051345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.079579][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.160652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.474366][ T8173] syz.3.2293[8173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.474441][ T8173] syz.3.2293[8173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.487471][ T8167] FAULT_INJECTION: forcing a failure. [ 385.487471][ T8167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.598009][ T8167] CPU: 1 PID: 8167 Comm: syz.6.2291 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 385.607860][ T8167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 385.617922][ T8167] Call Trace: [ 385.621194][ T8167] [ 385.624122][ T8167] __dump_stack+0x21/0x24 [ 385.628470][ T8167] dump_stack_lvl+0xee/0x150 [ 385.633059][ T8167] ? __cfi_dump_stack_lvl+0x8/0x8 [ 385.638084][ T8167] dump_stack+0x15/0x24 [ 385.642241][ T8167] should_fail_ex+0x3d4/0x520 [ 385.646916][ T8167] should_fail_alloc_page+0x61/0x90 [ 385.652115][ T8167] prepare_alloc_pages+0x148/0x5f0 [ 385.657227][ T8167] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 385.662425][ T8167] __alloc_pages+0x115/0x3a0 [ 385.667012][ T8167] ? __cfi___alloc_pages+0x10/0x10 [ 385.672120][ T8167] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 385.678273][ T8167] ? shmem_alloc_and_acct_folio+0x42f/0x870 [ 385.684168][ T8167] __folio_alloc+0x12/0x40 [ 385.688591][ T8167] shmem_alloc_and_acct_folio+0x650/0x870 [ 385.694310][ T8167] ? shmem_replace_folio+0x590/0x590 [ 385.699606][ T8167] ? xas_load+0x38b/0x3b0 [ 385.703932][ T8167] ? xas_load+0x390/0x3b0 [ 385.708264][ T8167] ? __filemap_get_folio+0x93e/0x980 [ 385.713563][ T8167] ? __cfi___filemap_get_folio+0x10/0x10 [ 385.719207][ T8167] ? __cfi_shmem_write_begin+0x10/0x10 [ 385.724672][ T8167] ? shmem_get_folio_gfp+0x2b1/0x2230 [ 385.730053][ T8167] shmem_get_folio_gfp+0x119f/0x2230 [ 385.735342][ T8167] shmem_write_begin+0xea/0x2c0 [ 385.740194][ T8167] generic_perform_write+0x2f6/0x6d0 [ 385.745481][ T8167] ? file_update_time+0x2d3/0x340 [ 385.750504][ T8167] ? __cfi_generic_perform_write+0x10/0x10 [ 385.756304][ T8167] ? __cfi_file_update_time+0x10/0x10 [ 385.761675][ T8167] __generic_file_write_iter+0x227/0x580 [ 385.767308][ T8167] ? __cfi___generic_file_write_iter+0x10/0x10 [ 385.773465][ T8167] ? rwsem_write_trylock+0x130/0x300 [ 385.778784][ T8167] ? generic_write_checks_count+0x3c6/0x4a0 [ 385.784682][ T8167] ? generic_write_checks+0xca/0x100 [ 385.789967][ T8167] generic_file_write_iter+0xae/0x310 [ 385.795344][ T8167] vfs_write+0x5db/0xca0 [ 385.799593][ T8167] ? __cfi_vfs_write+0x10/0x10 [ 385.804356][ T8167] ? __cfi_mutex_lock+0x10/0x10 [ 385.809206][ T8167] ? __fdget_pos+0x2cd/0x380 [ 385.813797][ T8167] ? ksys_write+0x71/0x240 [ 385.818218][ T8167] ksys_write+0x140/0x240 [ 385.822544][ T8167] ? __cfi_ksys_write+0x10/0x10 [ 385.827401][ T8167] __x64_sys_write+0x7b/0x90 [ 385.831995][ T8167] x64_sys_call+0x27b/0x9a0 [ 385.836507][ T8167] do_syscall_64+0x4c/0xa0 [ 385.840923][ T8167] ? clear_bhb_loop+0x30/0x80 [ 385.845607][ T8167] ? clear_bhb_loop+0x30/0x80 [ 385.850290][ T8167] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 385.856186][ T8167] RIP: 0033:0x7fb53e58e929 [ 385.860604][ T8167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.880212][ T8167] RSP: 002b:00007fb53f368038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 385.888634][ T8167] RAX: ffffffffffffffda RBX: 00007fb53e7b5fa0 RCX: 00007fb53e58e929 [ 385.896609][ T8167] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 385.904594][ T8167] RBP: 00007fb53f368090 R08: 0000000000000000 R09: 0000000000000000 [ 385.912576][ T8167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.920558][ T8167] R13: 0000000000000000 R14: 00007fb53e7b5fa0 R15: 00007fff160753b8 [ 385.928542][ T8167] [ 386.628035][ T8212] device syzkaller0 entered promiscuous mode [ 386.822787][ T8226] device veth0_vlan left promiscuous mode [ 386.895202][ T8226] device veth0_vlan entered promiscuous mode [ 387.358183][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.424395][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.502300][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.665356][ T8283] device syzkaller0 entered promiscuous mode [ 396.949642][ T8434] device sit0 left promiscuous mode [ 397.145650][ T8434] device sit0 entered promiscuous mode [ 399.361108][ T8487] device pim6reg1 entered promiscuous mode [ 400.284110][ T8521] device pim6reg1 entered promiscuous mode [ 404.643549][ T8622] syz.8.2430[8622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.643626][ T8622] syz.8.2430[8622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.556020][ T8661] FAULT_INJECTION: forcing a failure. [ 406.556020][ T8661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.741717][ T8661] CPU: 1 PID: 8661 Comm: syz.4.2442 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 406.751561][ T8661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 406.761616][ T8661] Call Trace: [ 406.764886][ T8661] [ 406.767809][ T8661] __dump_stack+0x21/0x24 [ 406.772142][ T8661] dump_stack_lvl+0xee/0x150 [ 406.776730][ T8661] ? __cfi_dump_stack_lvl+0x8/0x8 [ 406.781754][ T8661] dump_stack+0x15/0x24 [ 406.785910][ T8661] should_fail_ex+0x3d4/0x520 [ 406.790584][ T8661] should_fail_alloc_page+0x61/0x90 [ 406.795780][ T8661] prepare_alloc_pages+0x148/0x5f0 [ 406.800890][ T8661] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 406.806085][ T8661] __alloc_pages+0x115/0x3a0 [ 406.810671][ T8661] ? __cfi___alloc_pages+0x10/0x10 [ 406.815780][ T8661] ? percpu_counter_add_batch+0x13c/0x160 [ 406.821494][ T8661] __folio_alloc+0x12/0x40 [ 406.825906][ T8661] shmem_alloc_and_acct_folio+0x650/0x870 [ 406.831622][ T8661] ? shmem_replace_folio+0x590/0x590 [ 406.836910][ T8661] ? xas_load+0x390/0x3b0 [ 406.841237][ T8661] ? __filemap_get_folio+0x93e/0x980 [ 406.846529][ T8661] ? __cfi___filemap_get_folio+0x10/0x10 [ 406.852164][ T8661] ? do_user_addr_fault+0x9ac/0x1050 [ 406.857454][ T8661] shmem_get_folio_gfp+0x119f/0x2230 [ 406.862741][ T8661] shmem_write_begin+0xea/0x2c0 [ 406.867592][ T8661] generic_perform_write+0x2f6/0x6d0 [ 406.872875][ T8661] ? __cfi_generic_perform_write+0x10/0x10 [ 406.878675][ T8661] ? __cfi_file_update_time+0x10/0x10 [ 406.884042][ T8661] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 406.889764][ T8661] __generic_file_write_iter+0x227/0x580 [ 406.895391][ T8661] ? irqentry_exit+0x37/0x40 [ 406.899978][ T8661] ? __cfi___generic_file_write_iter+0x10/0x10 [ 406.906121][ T8661] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 406.912270][ T8661] ? generic_write_checks_count+0x3c6/0x4a0 [ 406.918156][ T8661] ? generic_write_checks+0xca/0x100 [ 406.923431][ T8661] generic_file_write_iter+0xae/0x310 [ 406.928804][ T8661] vfs_write+0x5db/0xca0 [ 406.933048][ T8661] ? __cfi_vfs_write+0x10/0x10 [ 406.937812][ T8661] ? __cfi_mutex_lock+0x10/0x10 [ 406.942655][ T8661] ? __fdget_pos+0x2cd/0x380 [ 406.947247][ T8661] ? ksys_write+0x71/0x240 [ 406.951660][ T8661] ksys_write+0x140/0x240 [ 406.955986][ T8661] ? __cfi_ksys_write+0x10/0x10 [ 406.960838][ T8661] ? __bpf_trace_sys_enter+0x62/0x70 [ 406.966115][ T8661] __x64_sys_write+0x7b/0x90 [ 406.970704][ T8661] x64_sys_call+0x27b/0x9a0 [ 406.975200][ T8661] do_syscall_64+0x4c/0xa0 [ 406.979607][ T8661] ? clear_bhb_loop+0x30/0x80 [ 406.984278][ T8661] ? clear_bhb_loop+0x30/0x80 [ 406.988946][ T8661] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 406.994831][ T8661] RIP: 0033:0x7fcfe418e929 [ 406.999246][ T8661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.018846][ T8661] RSP: 002b:00007fcfe500b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 407.027257][ T8661] RAX: ffffffffffffffda RBX: 00007fcfe43b5fa0 RCX: 00007fcfe418e929 [ 407.035223][ T8661] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 407.043188][ T8661] RBP: 00007fcfe500b090 R08: 0000000000000000 R09: 0000000000000000 [ 407.051153][ T8661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.059108][ T8661] R13: 0000000000000000 R14: 00007fcfe43b5fa0 R15: 00007ffd8a1a1ef8 [ 407.067067][ T8661] [ 414.670520][ T8856] syz.6.2503[8856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.670603][ T8856] syz.6.2503[8856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.525499][ T8851] bridge0: port 1(veth0) entered blocking state [ 415.552962][ T8851] bridge0: port 1(veth0) entered disabled state [ 415.615512][ T8851] device veth0 entered promiscuous mode [ 416.611905][ T8910] device sit0 left promiscuous mode [ 417.143250][ T8915] device sit0 entered promiscuous mode [ 417.530741][ T8921] bridge0: port 1(veth0) entered blocking state [ 417.537029][ T8921] bridge0: port 1(veth0) entered disabled state [ 417.543784][ T8921] device veth0 entered promiscuous mode [ 419.832195][ T8978] bridge0: port 3(veth0) entered blocking state [ 419.838481][ T8978] bridge0: port 3(veth0) entered disabled state [ 419.955871][ T8978] device veth0 entered promiscuous mode [ 419.961775][ T8978] bridge0: port 3(veth0) entered blocking state [ 419.968056][ T8978] bridge0: port 3(veth0) entered forwarding state [ 422.261539][ T9030] device sit0 entered promiscuous mode [ 422.981971][ T9040] device sit0 left promiscuous mode [ 426.774488][ T9102] syz.8.2575[9102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.774566][ T9102] syz.8.2575[9102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.087957][ T9105] device syzkaller0 entered promiscuous mode [ 429.111096][ T9161] device wg2 entered promiscuous mode [ 433.415650][ T9222] device syzkaller0 entered promiscuous mode [ 434.613647][ T9268] syz.8.2625[9268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.613718][ T9268] syz.8.2625[9268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.405145][ T9307] device syzkaller0 entered promiscuous mode [ 436.423150][ T9309] device sit0 left promiscuous mode [ 440.255003][ T28] audit: type=1400 audit(1751750685.444:152): avc: denied { create } for pid=9398 comm="syz.7.2669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 443.144027][ T9449] device veth0_vlan left promiscuous mode [ 443.154861][ T9449] device veth0_vlan entered promiscuous mode [ 443.290643][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.312736][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.432755][ T1815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.078811][ T9479] syz.7.2706[9479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.078907][ T9479] syz.7.2706[9479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.966128][ T9491] syz.8.2696[9491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.039234][ T9491] syz.8.2696[9491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.144310][ T9534] FAULT_INJECTION: forcing a failure. [ 448.144310][ T9534] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.228181][ T9534] CPU: 1 PID: 9534 Comm: syz.8.2709 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 448.238033][ T9534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 448.248085][ T9534] Call Trace: [ 448.251354][ T9534] [ 448.254274][ T9534] __dump_stack+0x21/0x24 [ 448.258608][ T9534] dump_stack_lvl+0xee/0x150 [ 448.263196][ T9534] ? __cfi_dump_stack_lvl+0x8/0x8 [ 448.268227][ T9534] dump_stack+0x15/0x24 [ 448.272381][ T9534] should_fail_ex+0x3d4/0x520 [ 448.277051][ T9534] should_fail+0xb/0x10 [ 448.281204][ T9534] should_fail_usercopy+0x1a/0x20 [ 448.286230][ T9534] _copy_from_user+0x1e/0xc0 [ 448.290817][ T9534] __sys_bpf+0x277/0x780 [ 448.295067][ T9534] ? bpf_link_show_fdinfo+0x320/0x320 [ 448.300445][ T9534] ? __cfi_ksys_write+0x10/0x10 [ 448.305296][ T9534] ? do_user_addr_fault+0x9ac/0x1050 [ 448.310580][ T9534] ? __bpf_trace_sys_enter+0x62/0x70 [ 448.315863][ T9534] __x64_sys_bpf+0x7c/0x90 [ 448.320279][ T9534] x64_sys_call+0x488/0x9a0 [ 448.324782][ T9534] do_syscall_64+0x4c/0xa0 [ 448.329197][ T9534] ? clear_bhb_loop+0x30/0x80 [ 448.333876][ T9534] ? clear_bhb_loop+0x30/0x80 [ 448.338556][ T9534] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 448.344447][ T9534] RIP: 0033:0x7fba4198e929 [ 448.348861][ T9534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 448.368465][ T9534] RSP: 002b:00007fba4287d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 448.376868][ T9534] RAX: ffffffffffffffda RBX: 00007fba41bb6080 RCX: 00007fba4198e929 [ 448.384824][ T9534] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 448.392774][ T9534] RBP: 00007fba4287d090 R08: 0000000000000000 R09: 0000000000000000 [ 448.400725][ T9534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.408673][ T9534] R13: 0000000000000001 R14: 00007fba41bb6080 R15: 00007ffcb6123c68 [ 448.416628][ T9534] [ 448.510812][ T9550] syz.7.2716[9550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.510885][ T9550] syz.7.2716[9550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.476027][ T9570] syz.8.2724[9570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.487720][ T9570] syz.8.2724[9570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.768840][ T9700] device veth0_vlan left promiscuous mode [ 457.004405][ T9700] device veth0_vlan entered promiscuous mode [ 457.153425][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.184718][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.326645][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.457273][ T9749] device pim6reg1 entered promiscuous mode [ 459.808892][ T9756] device macsec0 left promiscuous mode [ 465.530883][ T9819] GPL: port 1(gretap0) entered blocking state [ 465.538663][ T9819] GPL: port 1(gretap0) entered disabled state [ 465.717186][ T9819] device gretap0 entered promiscuous mode [ 466.774387][ T9838] device sit0 entered promiscuous mode [ 469.343370][ T9903] device sit0 left promiscuous mode [ 469.428451][ T9904] device sit0 entered promiscuous mode [ 470.254697][ T9924] device syzkaller0 entered promiscuous mode [ 470.348001][ T9924] syzkaller0: tun_net_xmit 200 [ 471.044910][ T9939] device sit0 left promiscuous mode [ 472.028932][ T9941] device sit0 entered promiscuous mode [ 472.363797][ T28] audit: type=1400 audit(1751750717.554:153): avc: denied { create } for pid=9947 comm="syz.3.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 472.551827][ T9944] device syzkaller0 entered promiscuous mode [ 473.522736][ T10] device gretap0 left promiscuous mode [ 473.528263][ T10] GPL: port 1(gretap0) entered disabled state [ 473.706595][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.800716][ T9958] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.895870][ T9958] device bridge_slave_0 entered promiscuous mode [ 473.930975][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.938048][ T9958] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.050424][ T9991] syz.6.2843[9991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.050498][ T9991] syz.6.2843[9991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.279001][ T9958] device bridge_slave_1 entered promiscuous mode [ 474.435255][ T9992] device sit0 entered promiscuous mode [ 474.886655][ T10] device veth0 left promiscuous mode [ 474.892098][ T10] bridge0: port 1(veth0) entered disabled state [ 475.011557][ T10] device veth1_macvtap left promiscuous mode [ 477.777841][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 477.791018][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 478.100870][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 478.140089][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 478.291842][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.298926][ T1817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.391295][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 478.441151][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 478.456316][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 478.464669][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.471709][ T1817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.479749][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 478.487895][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 478.557297][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 478.565758][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 478.583906][ T9958] device veth0_vlan entered promiscuous mode [ 478.596868][ T9958] device veth1_macvtap entered promiscuous mode [ 478.737999][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 478.747667][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 478.757010][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 478.766210][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.784549][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 478.793115][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 478.801788][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 478.809480][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 478.818188][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 478.828390][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 478.838360][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 478.875300][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.884075][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 479.949126][T10066] syzkaller0: create flow: hash 319826441 index 1 [ 480.170269][T10059] syzkaller0: delete flow: hash 319826441 index 1 [ 480.997174][ T28] audit: type=1400 audit(1751750726.084:154): avc: denied { create } for pid=10080 comm="syz.3.2869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 483.418721][T10177] device syzkaller0 entered promiscuous mode [ 484.454928][T10223] syz.6.2910[10223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.455002][T10223] syz.6.2910[10223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.307387][T10332] device pim6reg1 entered promiscuous mode [ 494.742140][T10436] syz.4.2978[10436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.742216][T10436] syz.4.2978[10436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.896381][T10444] device sit0 entered promiscuous mode [ 495.688155][T10437] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.720511][T10437] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.728552][T10437] device bridge_slave_0 entered promiscuous mode [ 495.741572][T10437] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.860860][T10437] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.868390][T10437] device bridge_slave_1 entered promiscuous mode [ 496.923991][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 496.951455][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.070790][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 497.080096][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 497.088525][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.095576][ T1817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.104132][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 497.121022][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 497.135826][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.142908][ T1817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.163212][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 497.236694][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 497.246228][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 497.351541][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 497.415439][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 497.475653][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 497.519925][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 497.607383][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 497.654010][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.733744][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.744266][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.761210][T10437] device veth0_vlan entered promiscuous mode [ 497.821995][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 497.842920][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.946405][T10437] device veth1_macvtap entered promiscuous mode [ 497.974137][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.985044][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 498.006533][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 498.022314][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 498.143886][ T1823] device veth0 left promiscuous mode [ 498.149286][ T1823] bridge0: port 1(veth0) entered disabled state [ 498.192101][ T1823] device veth0_vlan left promiscuous mode [ 498.416251][T10540] syz.8.3004[10540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.416341][T10540] syz.8.3004[10540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.612432][T10531] device syzkaller0 entered promiscuous mode [ 498.770799][T10534] device sit0 left promiscuous mode [ 498.802684][T10539] device sit0 entered promiscuous mode [ 506.013162][ T28] audit: type=1400 audit(1751750751.204:155): avc: denied { append } for pid=10662 comm="syz.6.3043" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 507.340936][T10717] device syzkaller0 entered promiscuous mode [ 507.369678][T10723] device sit0 left promiscuous mode [ 509.826386][T10785] device wg2 entered promiscuous mode [ 512.640777][T10838] device sit0 left promiscuous mode [ 513.857266][T10862] device wg2 entered promiscuous mode [ 520.693599][T10962] device syzkaller0 entered promiscuous mode [ 527.055195][T11129] syz.4.3190[11129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.055266][T11129] syz.4.3190[11129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.044441][T11156] device sit0 entered promiscuous mode [ 529.839859][T11166] device syzkaller0 entered promiscuous mode [ 531.207179][T11203] device sit0 entered promiscuous mode [ 534.243358][T11262] device sit0 entered promiscuous mode [ 536.217762][T11314] device syzkaller0 entered promiscuous mode [ 538.546159][T11404] device syzkaller0 entered promiscuous mode [ 538.737994][T11423] syz.8.3283[11423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.738069][T11423] syz.8.3283[11423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.699609][T11450] device syzkaller0 entered promiscuous mode [ 544.081595][T11526] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.088826][T11526] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.160688][T11527] device bridge_slave_1 left promiscuous mode [ 544.166861][T11527] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.179325][T11527] device bridge_slave_0 left promiscuous mode [ 544.185963][T11527] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.107351][T11577] syz.3.3325[11577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.107421][T11577] syz.3.3325[11577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.158866][T11568] device pim6reg1 entered promiscuous mode [ 546.196108][T11571] bond_slave_1: mtu less than device minimum [ 549.135109][T11638] device pim6reg1 entered promiscuous mode [ 550.738172][T11670] device pim6reg1 entered promiscuous mode [ 552.457089][T11739] FAULT_INJECTION: forcing a failure. [ 552.457089][T11739] name failslab, interval 1, probability 0, space 0, times 0 [ 552.603938][T11739] CPU: 1 PID: 11739 Comm: syz.8.3376 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 552.613886][T11739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 552.623945][T11739] Call Trace: [ 552.627316][T11739] [ 552.630240][T11739] __dump_stack+0x21/0x24 [ 552.634631][T11739] dump_stack_lvl+0xee/0x150 [ 552.639224][T11739] ? __cfi_dump_stack_lvl+0x8/0x8 [ 552.644304][T11739] ? avc_has_perm+0x158/0x240 [ 552.648983][T11739] dump_stack+0x15/0x24 [ 552.653141][T11739] should_fail_ex+0x3d4/0x520 [ 552.657822][T11739] __should_failslab+0xac/0xf0 [ 552.662592][T11739] should_failslab+0x9/0x20 [ 552.667097][T11739] slab_pre_alloc_hook+0x30/0x1e0 [ 552.672122][T11739] ? __kasan_check_write+0x14/0x20 [ 552.677232][T11739] kmem_cache_alloc_lru+0x49/0x280 [ 552.682341][T11739] ? sock_alloc_inode+0x28/0xc0 [ 552.687194][T11739] sock_alloc_inode+0x28/0xc0 [ 552.691870][T11739] ? __cfi_sock_alloc_inode+0x10/0x10 [ 552.697239][T11739] new_inode_pseudo+0x70/0x1f0 [ 552.701999][T11739] __sock_create+0x12c/0x7c0 [ 552.706591][T11739] __sys_socketpair+0x1a1/0x5b0 [ 552.711443][T11739] __x64_sys_socketpair+0x9b/0xb0 [ 552.716469][T11739] x64_sys_call+0x6e/0x9a0 [ 552.720882][T11739] do_syscall_64+0x4c/0xa0 [ 552.725293][T11739] ? clear_bhb_loop+0x30/0x80 [ 552.729972][T11739] ? clear_bhb_loop+0x30/0x80 [ 552.734650][T11739] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 552.740541][T11739] RIP: 0033:0x7fba4198e929 [ 552.745031][T11739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 552.764644][T11739] RSP: 002b:00007fba4289e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 552.773136][T11739] RAX: ffffffffffffffda RBX: 00007fba41bb5fa0 RCX: 00007fba4198e929 [ 552.781105][T11739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 552.789076][T11739] RBP: 00007fba4289e090 R08: 0000000000000000 R09: 0000000000000000 [ 552.797044][T11739] R10: 00002000000006c0 R11: 0000000000000246 R12: 0000000000000001 [ 552.805014][T11739] R13: 0000000000000000 R14: 00007fba41bb5fa0 R15: 00007ffcb6123c68 [ 552.812989][T11739] [ 552.903701][T11739] socket: no more sockets [ 553.324446][T11758] device syzkaller0 entered promiscuous mode [ 553.924259][T11773] bond_slave_1: mtu less than device minimum [ 556.093960][T11823] ip6_vti0: mtu greater than device maximum [ 557.203403][T11845] syz.6.3409[11845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.203474][T11845] syz.6.3409[11845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.252031][T11871] GPL: port 1(erspan0) entered blocking state [ 559.269893][T11871] GPL: port 1(erspan0) entered disabled state [ 559.279285][T11871] device erspan0 entered promiscuous mode [ 559.301706][T11873] GPL: port 1(erspan0) entered blocking state [ 559.308084][T11873] GPL: port 1(erspan0) entered forwarding state [ 559.858320][T11886] FAULT_INJECTION: forcing a failure. [ 559.858320][T11886] name failslab, interval 1, probability 0, space 0, times 0 [ 559.970958][T11886] CPU: 1 PID: 11886 Comm: syz.4.3417 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 559.980896][T11886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 559.990950][T11886] Call Trace: [ 559.994220][T11886] [ 559.997141][T11886] __dump_stack+0x21/0x24 [ 560.001475][T11886] dump_stack_lvl+0xee/0x150 [ 560.006063][T11886] ? __cfi_dump_stack_lvl+0x8/0x8 [ 560.011088][T11886] dump_stack+0x15/0x24 [ 560.015241][T11886] should_fail_ex+0x3d4/0x520 [ 560.019915][T11886] ? security_inode_alloc+0x33/0x120 [ 560.025205][T11886] __should_failslab+0xac/0xf0 [ 560.029963][T11886] should_failslab+0x9/0x20 [ 560.034464][T11886] kmem_cache_alloc+0x3b/0x330 [ 560.039224][T11886] security_inode_alloc+0x33/0x120 [ 560.044338][T11886] inode_init_always+0x6fc/0x960 [ 560.049276][T11886] new_inode_pseudo+0xa2/0x1f0 [ 560.054036][T11886] __sock_create+0x12c/0x7c0 [ 560.058631][T11886] __sys_socketpair+0x1a1/0x5b0 [ 560.063479][T11886] __x64_sys_socketpair+0x9b/0xb0 [ 560.068504][T11886] x64_sys_call+0x6e/0x9a0 [ 560.072919][T11886] do_syscall_64+0x4c/0xa0 [ 560.077332][T11886] ? clear_bhb_loop+0x30/0x80 [ 560.082002][T11886] ? clear_bhb_loop+0x30/0x80 [ 560.086672][T11886] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 560.092564][T11886] RIP: 0033:0x7f6a06f8e929 [ 560.096970][T11886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.116574][T11886] RSP: 002b:00007f6a07d62038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 560.124987][T11886] RAX: ffffffffffffffda RBX: 00007f6a071b5fa0 RCX: 00007f6a06f8e929 [ 560.132954][T11886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 560.140920][T11886] RBP: 00007f6a07d62090 R08: 0000000000000000 R09: 0000000000000000 [ 560.148885][T11886] R10: 00002000000006c0 R11: 0000000000000246 R12: 0000000000000001 [ 560.156851][T11886] R13: 0000000000000000 R14: 00007f6a071b5fa0 R15: 00007ffdafd72348 [ 560.164904][T11886] [ 560.514068][T11886] socket: no more sockets [ 562.838761][T11931] device sit0 left promiscuous mode [ 562.991840][T11931] device sit0 entered promiscuous mode [ 563.713353][T11943] device pim6reg1 entered promiscuous mode [ 566.822434][T11995] device veth0_vlan left promiscuous mode [ 566.830353][T11995] device veth0_vlan entered promiscuous mode [ 566.966578][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 566.991793][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 567.049627][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 568.066379][T12041] GPL: port 1(erspan0) entered blocking state [ 568.119475][T12041] GPL: port 1(erspan0) entered disabled state [ 568.142924][T12041] device erspan0 entered promiscuous mode [ 568.149409][T12042] GPL: port 1(erspan0) entered blocking state [ 568.155507][T12042] GPL: port 1(erspan0) entered forwarding state [ 568.606818][T12044] device veth1_macvtap left promiscuous mode [ 569.803444][T12067] FAULT_INJECTION: forcing a failure. [ 569.803444][T12067] name failslab, interval 1, probability 0, space 0, times 0 [ 570.117319][T12067] CPU: 1 PID: 12067 Comm: syz.8.3469 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 570.127256][T12067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 570.137311][T12067] Call Trace: [ 570.140581][T12067] [ 570.143515][T12067] __dump_stack+0x21/0x24 [ 570.147851][T12067] dump_stack_lvl+0xee/0x150 [ 570.152437][T12067] ? __cfi_dump_stack_lvl+0x8/0x8 [ 570.157461][T12067] dump_stack+0x15/0x24 [ 570.161614][T12067] should_fail_ex+0x3d4/0x520 [ 570.166291][T12067] __should_failslab+0xac/0xf0 [ 570.171052][T12067] ? __request_module+0x273/0x890 [ 570.176069][T12067] should_failslab+0x9/0x20 [ 570.180569][T12067] __kmem_cache_alloc_node+0x3d/0x2c0 [ 570.185939][T12067] ? __request_module+0x273/0x890 [ 570.190957][T12067] kmalloc_trace+0x29/0xb0 [ 570.195372][T12067] ? __sock_create+0x200/0x7c0 [ 570.200139][T12067] __request_module+0x273/0x890 [ 570.204987][T12067] ? kasan_save_alloc_info+0x25/0x30 [ 570.210279][T12067] ? __kasan_slab_alloc+0x72/0x80 [ 570.215297][T12067] ? __cfi___request_module+0x10/0x10 [ 570.220661][T12067] ? security_inode_alloc+0x33/0x120 [ 570.225947][T12067] ? _raw_spin_lock+0x8e/0xe0 [ 570.230622][T12067] ? __cfi__raw_spin_lock+0x10/0x10 [ 570.235820][T12067] ? security_inode_alloc+0xd1/0x120 [ 570.241107][T12067] ? inode_init_always+0x714/0x960 [ 570.246220][T12067] __sock_create+0x2fc/0x7c0 [ 570.250810][T12067] __sys_socketpair+0x1a1/0x5b0 [ 570.255658][T12067] __x64_sys_socketpair+0x9b/0xb0 [ 570.260686][T12067] x64_sys_call+0x6e/0x9a0 [ 570.265108][T12067] do_syscall_64+0x4c/0xa0 [ 570.269524][T12067] ? clear_bhb_loop+0x30/0x80 [ 570.274197][T12067] ? clear_bhb_loop+0x30/0x80 [ 570.278865][T12067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 570.284753][T12067] RIP: 0033:0x7fba4198e929 [ 570.289161][T12067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.308760][T12067] RSP: 002b:00007fba4289e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 570.317185][T12067] RAX: ffffffffffffffda RBX: 00007fba41bb5fa0 RCX: 00007fba4198e929 [ 570.325157][T12067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 570.333132][T12067] RBP: 00007fba4289e090 R08: 0000000000000000 R09: 0000000000000000 [ 570.341101][T12067] R10: 00002000000006c0 R11: 0000000000000246 R12: 0000000000000001 [ 570.349065][T12067] R13: 0000000000000000 R14: 00007fba41bb5fa0 R15: 00007ffcb6123c68 [ 570.357038][T12067] [ 573.550952][T12118] device syzkaller0 entered promiscuous mode [ 574.961274][T12173] syz.8.3500[12173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.961347][T12173] syz.8.3500[12173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.839144][T12191] device veth0_vlan left promiscuous mode [ 575.989271][T12191] device veth0_vlan entered promiscuous mode [ 576.285596][T12197] device syzkaller0 entered promiscuous mode [ 581.181477][ T28] audit: type=1400 audit(1751750826.374:156): avc: denied { create } for pid=12287 comm="syz.6.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 582.508363][ T28] audit: type=1400 audit(1751750827.694:157): avc: denied { ioctl } for pid=12318 comm="syz.7.3541" path="net:[4026532337]" dev="nsfs" ino=4026532337 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 582.538800][T12320] bridge0: port 3(dummy0) entered blocking state [ 582.558274][T12320] bridge0: port 3(dummy0) entered disabled state [ 582.589879][T12320] device dummy0 entered promiscuous mode [ 582.600896][T12320] bridge0: port 3(dummy0) entered blocking state [ 582.607320][T12320] bridge0: port 3(dummy0) entered forwarding state [ 583.708653][T12347] bridge0: port 3(dummy0) entered disabled state [ 583.716863][T12347] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.728003][T12347] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.937251][T12348] device dummy0 left promiscuous mode [ 583.947099][T12348] bridge0: port 3(dummy0) entered disabled state [ 583.971302][T12348] device bridge_slave_1 left promiscuous mode [ 583.977489][T12348] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.041529][T12348] device bridge_slave_0 left promiscuous mode [ 584.068115][T12348] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.845088][T12384] device pim6reg1 entered promiscuous mode [ 586.783408][T12406] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.794170][T12406] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.975458][T12413] device bridge_slave_1 left promiscuous mode [ 586.992270][T12413] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.023728][T12413] device bridge_slave_0 left promiscuous mode [ 587.040162][T12413] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.697022][T12485] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.706139][T12485] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.780700][T12496] device bridge_slave_1 left promiscuous mode [ 589.790507][T12496] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.798617][T12496] device bridge_slave_0 left promiscuous mode [ 589.804874][T12496] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.849793][T12582] device wg2 entered promiscuous mode [ 594.493121][T12592] syz.8.3622[12592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.493198][T12592] syz.8.3622[12592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 597.847726][T12663] device veth0_vlan left promiscuous mode [ 597.866781][T12663] device veth0_vlan entered promiscuous mode [ 598.116713][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 598.146424][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 598.277751][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 598.852207][T12713] syz.4.3656[12713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.852280][T12713] syz.4.3656[12713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.275031][T12851] device sit0 left promiscuous mode [ 609.860191][T12957] device sit0 entered promiscuous mode [ 614.758759][T13037] device veth1_macvtap left promiscuous mode [ 614.900084][T13038] device veth1_macvtap entered promiscuous mode [ 614.909729][T13038] device macsec0 entered promiscuous mode [ 616.318851][T13074] syz.8.3760[13074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.318922][T13074] syz.8.3760[13074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.736627][T13245] device veth0_vlan left promiscuous mode [ 621.909523][T13245] device veth0_vlan entered promiscuous mode [ 622.082118][T13258] tap0: tun_chr_ioctl cmd 1074025677 [ 622.093450][T13258] tap0: linktype set to 823 [ 622.386874][T13279] syz.6.3819[13279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.386945][T13279] syz.6.3819[13279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.958223][T13412] device veth0_vlan left promiscuous mode [ 629.038505][T13412] device veth0_vlan entered promiscuous mode [ 629.219078][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.234086][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.250383][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.557320][T13499] device veth0_vlan left promiscuous mode [ 632.568638][T13499] device veth0_vlan entered promiscuous mode [ 632.625905][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 632.635119][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 632.643176][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.901305][T13527] device veth0_vlan left promiscuous mode [ 632.944021][T13527] device veth0_vlan entered promiscuous mode [ 632.998753][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.014780][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 633.111187][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 635.193145][T13570] device veth0_vlan left promiscuous mode [ 635.199187][T13570] device veth0_vlan entered promiscuous mode [ 635.380095][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.459829][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.479752][ T1128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 638.781069][T13631] syz.6.3930[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.781142][T13631] syz.6.3930[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.385507][T13653] device sit0 left promiscuous mode [ 641.911624][T13656] device sit0 entered promiscuous mode [ 644.461414][T13689] device sit0 left promiscuous mode [ 644.542185][T13689] device sit0 entered promiscuous mode [ 647.093262][ T28] audit: type=1400 audit(1751750892.274:158): avc: denied { create } for pid=13748 comm="syz.4.3967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 647.174716][T13752] device sit0 left promiscuous mode [ 647.286815][T13752] device sit0 entered promiscuous mode [ 647.530341][T13756] device sit0 left promiscuous mode [ 647.549548][T13760] device sit0 entered promiscuous mode [ 650.231186][T13812] device sit0 left promiscuous mode [ 650.381698][T13814] device sit0 entered promiscuous mode [ 650.875700][T13827] device sit0 left promiscuous mode [ 650.975810][T13827] device sit0 entered promiscuous mode [ 652.602959][T13856] syz.6.4001[13856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.603035][T13856] syz.6.4001[13856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.851742][T13898] device bridge0 entered promiscuous mode [ 657.567080][T13910] Ÿë: port 1(ip6gretap0) entered blocking state [ 657.678834][T13910] Ÿë: port 1(ip6gretap0) entered disabled state [ 657.692553][T13910] device ip6gretap0 entered promiscuous mode [ 658.073330][T13923] device sit0 left promiscuous mode [ 658.992400][T13926] device sit0 entered promiscuous mode [ 663.395697][T13992] syz.7.4038[13992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.395771][T13992] syz.7.4038[13992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.976370][T14131] device sit0 left promiscuous mode [ 671.013351][T14133] syz.3.4084[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 671.013427][T14133] syz.3.4084[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 671.057901][T14134] device sit0 entered promiscuous mode [ 671.753830][T14161] device pim6reg1 entered promiscuous mode [ 672.898930][ T1817] device ip6gretap0 left promiscuous mode [ 672.922791][ T1817] Ÿë: port 1(ip6gretap0) entered disabled state [ 673.304138][T14187] device sit0 entered promiscuous mode [ 674.095907][T14177] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.103031][T14177] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.110491][T14177] device bridge_slave_0 entered promiscuous mode [ 674.119237][T14177] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.126434][T14177] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.134284][T14177] device bridge_slave_1 entered promiscuous mode [ 675.843050][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 675.855204][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 675.875006][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 675.884086][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 675.896006][T10125] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.903077][T10125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 675.911415][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 676.028103][T14229] device sit0 left promiscuous mode [ 676.249018][T14234] device sit0 entered promiscuous mode [ 676.834291][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 676.870984][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 676.945374][T10125] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.952456][T10125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.991010][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 677.005602][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.015580][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.028762][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.044491][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 677.053840][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.075408][T14177] device veth0_vlan entered promiscuous mode [ 677.325446][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 677.335533][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.436185][T14177] device veth1_macvtap entered promiscuous mode [ 677.605312][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.625910][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 677.687435][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 677.771888][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 677.782112][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 677.838469][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 677.867622][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 677.876137][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 677.885151][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 688.079879][T14475] syz.6.4186[14475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.079991][T14475] syz.6.4186[14475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.421463][T14477] device sit0 left promiscuous mode [ 688.923186][T14486] device sit0 entered promiscuous mode [ 689.002305][T14496] device syzkaller0 entered promiscuous mode [ 692.183251][T14587] device sit0 entered promiscuous mode [ 693.947273][T14645] device wg2 entered promiscuous mode [ 694.356050][T14658] device sit0 left promiscuous mode [ 695.464701][ T28] audit: type=1400 audit(1751750940.654:159): avc: denied { create } for pid=14675 comm="syz.6.4251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 700.762526][T14762] syz.8.4275[14762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.762600][T14762] syz.8.4275[14762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.717125][T14835] syz.4.4297[14835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.770951][T14835] syz.4.4297[14835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.961292][ T28] audit: type=1400 audit(1751750957.154:160): avc: denied { getattr } for pid=15025 comm="syz.8.4355" path="net:[4026532453]" dev="nsfs" ino=4026532453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 712.919787][T15054] device syzkaller0 entered promiscuous mode [ 713.729730][T15078] device syzkaller0 entered promiscuous mode [ 713.892342][T15097] device sit0 left promiscuous mode [ 713.906696][T15103] device sit0 entered promiscuous mode [ 715.197646][T15135] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.208157][T15135] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.573832][T15156] device syzkaller0 entered promiscuous mode [ 716.775745][T15180] device sit0 left promiscuous mode [ 717.299349][T15194] device pim6reg1 entered promiscuous mode [ 718.148927][T15213] bridge0: port 3(veth0) entered disabled state [ 718.158542][T15213] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.168384][T15213] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.425580][T15213] device bridge0 left promiscuous mode [ 720.529083][T15288] syz.7.4442[15288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 720.529158][T15288] syz.7.4442[15288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.866022][T15418] device sit0 left promiscuous mode [ 726.100129][T15425] device sit0 entered promiscuous mode [ 728.041077][T15510] syz.4.4520[15510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.041153][T15510] syz.4.4520[15510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.412537][T15512] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.463080][T15512] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.470858][T15512] device bridge_slave_0 entered promiscuous mode [ 728.516119][T15512] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.523204][T15512] bridge0: port 2(bridge_slave_1) entered disabled state [ 728.540860][T15512] device bridge_slave_1 entered promiscuous mode [ 729.894478][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.990951][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 730.123045][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 730.221038][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 730.433889][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.440988][ T1823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.517274][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 730.530977][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 730.549426][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.556501][ T1823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.570830][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 730.589165][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 730.720119][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 730.823882][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 730.832002][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 731.027800][T15512] device veth0_vlan entered promiscuous mode [ 731.079087][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 731.089242][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 731.099263][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 731.107596][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 731.121144][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 731.169726][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 731.248722][T15512] device veth1_macvtap entered promiscuous mode [ 731.325013][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 731.356501][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 731.378462][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 731.395198][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 731.403773][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 731.412294][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 731.420722][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 731.796709][T10125] device veth0 left promiscuous mode [ 731.802158][T10125] bridge0: port 3(veth0) entered disabled state [ 731.912229][T10125] device bridge_slave_1 left promiscuous mode [ 731.918392][T10125] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.060773][T10125] device bridge_slave_0 left promiscuous mode [ 732.066929][T10125] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.312927][T10125] device veth1_macvtap left promiscuous mode [ 732.318983][T10125] device veth0_vlan left promiscuous mode [ 733.332104][T15588] device sit0 entered promiscuous mode [ 733.732880][T15599] syz.7.4546[15599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.732958][T15599] syz.7.4546[15599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.640769][T15693] device wg2 entered promiscuous mode [ 737.873242][T15701] syz.8.4578[15701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.873320][T15701] syz.8.4578[15701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.181712][T15741] device veth1_macvtap left promiscuous mode [ 739.212203][T15741] device macsec0 left promiscuous mode [ 745.562312][T15866] FAULT_INJECTION: forcing a failure. [ 745.562312][T15866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.656886][T15866] CPU: 1 PID: 15866 Comm: syz.7.4630 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 745.666822][T15866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 745.676875][T15866] Call Trace: [ 745.680147][T15866] [ 745.683066][T15866] __dump_stack+0x21/0x24 [ 745.687402][T15866] dump_stack_lvl+0xee/0x150 [ 745.691992][T15866] ? __cfi_dump_stack_lvl+0x8/0x8 [ 745.697020][T15866] ? __kmalloc_node+0xb2/0x1e0 [ 745.701783][T15866] dump_stack+0x15/0x24 [ 745.705948][T15866] should_fail_ex+0x3d4/0x520 [ 745.710632][T15866] should_fail+0xb/0x10 [ 745.714800][T15866] should_fail_usercopy+0x1a/0x20 [ 745.719838][T15866] _copy_from_user+0x1e/0xc0 [ 745.724426][T15866] generic_map_update_batch+0x458/0x780 [ 745.729974][T15866] ? __cfi_generic_map_update_batch+0x10/0x10 [ 745.736037][T15866] ? __fdget+0x19c/0x220 [ 745.740283][T15866] ? __cfi_generic_map_update_batch+0x10/0x10 [ 745.746346][T15866] bpf_map_do_batch+0x48c/0x620 [ 745.751194][T15866] __sys_bpf+0x624/0x780 [ 745.755436][T15866] ? bpf_link_show_fdinfo+0x320/0x320 [ 745.760812][T15866] ? __cfi_ksys_write+0x10/0x10 [ 745.765662][T15866] ? debug_smp_processor_id+0x17/0x20 [ 745.771031][T15866] __x64_sys_bpf+0x7c/0x90 [ 745.775445][T15866] x64_sys_call+0x488/0x9a0 [ 745.779942][T15866] do_syscall_64+0x4c/0xa0 [ 745.784349][T15866] ? clear_bhb_loop+0x30/0x80 [ 745.789022][T15866] ? clear_bhb_loop+0x30/0x80 [ 745.793694][T15866] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 745.799583][T15866] RIP: 0033:0x7f8675d8e929 [ 745.803997][T15866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 745.823599][T15866] RSP: 002b:00007f8676bbb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 745.832016][T15866] RAX: ffffffffffffffda RBX: 00007f8675fb5fa0 RCX: 00007f8675d8e929 [ 745.839985][T15866] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 745.847956][T15866] RBP: 00007f8676bbb090 R08: 0000000000000000 R09: 0000000000000000 [ 745.855920][T15866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.863889][T15866] R13: 0000000000000000 R14: 00007f8675fb5fa0 R15: 00007ffc1b05e398 [ 745.871858][T15866] [ 748.345670][T15924] device pim6reg1 entered promiscuous mode [ 749.090972][T15960] device sit0 left promiscuous mode [ 749.177073][T15960] device sit0 entered promiscuous mode [ 751.629565][T16014] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 753.842852][T16055] device veth0_vlan left promiscuous mode [ 753.890427][T16055] device veth0_vlan entered promiscuous mode [ 754.011342][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.029927][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.090963][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.497011][T16074] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 755.089923][T16084] FAULT_INJECTION: forcing a failure. [ 755.089923][T16084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.123656][T16084] CPU: 1 PID: 16084 Comm: syz.3.4699 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 755.133587][T16084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 755.143639][T16084] Call Trace: [ 755.146910][T16084] [ 755.149832][T16084] __dump_stack+0x21/0x24 [ 755.154170][T16084] dump_stack_lvl+0xee/0x150 [ 755.158759][T16084] ? __cfi_dump_stack_lvl+0x8/0x8 [ 755.163784][T16084] dump_stack+0x15/0x24 [ 755.167941][T16084] should_fail_ex+0x3d4/0x520 [ 755.172616][T16084] should_fail+0xb/0x10 [ 755.176768][T16084] should_fail_usercopy+0x1a/0x20 [ 755.181784][T16084] _copy_from_user+0x1e/0xc0 [ 755.186369][T16084] generic_map_update_batch+0x4b1/0x780 [ 755.191918][T16084] ? __cfi_generic_map_update_batch+0x10/0x10 [ 755.197984][T16084] ? __fdget+0x19c/0x220 [ 755.202224][T16084] ? __cfi_generic_map_update_batch+0x10/0x10 [ 755.208285][T16084] bpf_map_do_batch+0x48c/0x620 [ 755.213132][T16084] __sys_bpf+0x624/0x780 [ 755.217380][T16084] ? bpf_link_show_fdinfo+0x320/0x320 [ 755.222753][T16084] ? __cfi_ksys_write+0x10/0x10 [ 755.227601][T16084] ? debug_smp_processor_id+0x17/0x20 [ 755.232973][T16084] __x64_sys_bpf+0x7c/0x90 [ 755.237388][T16084] x64_sys_call+0x488/0x9a0 [ 755.241883][T16084] do_syscall_64+0x4c/0xa0 [ 755.246297][T16084] ? clear_bhb_loop+0x30/0x80 [ 755.250970][T16084] ? clear_bhb_loop+0x30/0x80 [ 755.255644][T16084] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 755.261529][T16084] RIP: 0033:0x7f2061d8e929 [ 755.265935][T16084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 755.285542][T16084] RSP: 002b:00007f2062caa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.293959][T16084] RAX: ffffffffffffffda RBX: 00007f2061fb5fa0 RCX: 00007f2061d8e929 [ 755.301926][T16084] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 755.309889][T16084] RBP: 00007f2062caa090 R08: 0000000000000000 R09: 0000000000000000 [ 755.317854][T16084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 755.325816][T16084] R13: 0000000000000000 R14: 00007f2061fb5fa0 R15: 00007fffca0e2468 [ 755.333792][T16084] [ 756.334670][T16106] FAULT_INJECTION: forcing a failure. [ 756.334670][T16106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 756.356573][T16106] CPU: 0 PID: 16106 Comm: syz.7.4708 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 756.366494][T16106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 756.376558][T16106] Call Trace: [ 756.379834][T16106] [ 756.382758][T16106] __dump_stack+0x21/0x24 [ 756.387092][T16106] dump_stack_lvl+0xee/0x150 [ 756.391684][T16106] ? __cfi_dump_stack_lvl+0x8/0x8 [ 756.396712][T16106] ? __cfi_avc_has_perm+0x10/0x10 [ 756.401736][T16106] dump_stack+0x15/0x24 [ 756.405891][T16106] should_fail_ex+0x3d4/0x520 [ 756.410567][T16106] should_fail+0xb/0x10 [ 756.414722][T16106] should_fail_usercopy+0x1a/0x20 [ 756.419751][T16106] _copy_from_user+0x1e/0xc0 [ 756.424337][T16106] tipc_setsockopt+0x34c/0x900 [ 756.429093][T16106] ? __cfi_tipc_setsockopt+0x10/0x10 [ 756.434375][T16106] ? security_socket_setsockopt+0x93/0xb0 [ 756.440361][T16106] ? __cfi_tipc_setsockopt+0x10/0x10 [ 756.445638][T16106] __sys_setsockopt+0x306/0x4e0 [ 756.450485][T16106] ? __cfi___sys_setsockopt+0x10/0x10 [ 756.455851][T16106] ? sched_clock_cpu+0x6e/0x250 [ 756.460706][T16106] __x64_sys_setsockopt+0xbf/0xd0 [ 756.465730][T16106] x64_sys_call+0x124/0x9a0 [ 756.470228][T16106] do_syscall_64+0x4c/0xa0 [ 756.474637][T16106] ? clear_bhb_loop+0x30/0x80 [ 756.479309][T16106] ? clear_bhb_loop+0x30/0x80 [ 756.483983][T16106] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 756.489877][T16106] RIP: 0033:0x7f8675d8e929 [ 756.494285][T16106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 756.513885][T16106] RSP: 002b:00007f8676bbb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 756.522303][T16106] RAX: ffffffffffffffda RBX: 00007f8675fb5fa0 RCX: 00007f8675d8e929 [ 756.530270][T16106] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000005 [ 756.538237][T16106] RBP: 00007f8676bbb090 R08: 00000000000004bd R09: 0000000000000000 [ 756.546211][T16106] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 756.554188][T16106] R13: 0000000000000000 R14: 00007f8675fb5fa0 R15: 00007ffc1b05e398 [ 756.562164][T16106] [ 757.745859][T16134] device pim6reg1 entered promiscuous mode [ 757.901329][T16133] ref_ctr_offset mismatch. inode: 0x810 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 761.948658][T16276] syz.6.4758[16276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.948724][T16276] syz.6.4758[16276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 764.931256][T16355] bond_slave_1: mtu less than device minimum [ 765.594309][T16370] syz.7.4787[16370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.594383][T16370] syz.7.4787[16370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.229632][T16381] device syzkaller0 entered promiscuous mode [ 769.896442][T16501] device syzkaller0 entered promiscuous mode [ 773.416672][T16565] device veth1_macvtap left promiscuous mode [ 774.431299][T16570] device veth1_macvtap left promiscuous mode [ 774.491495][T16570] device macsec0 entered promiscuous mode [ 774.808000][T16573] device veth1_macvtap entered promiscuous mode [ 776.014488][T16585] device sit0 left promiscuous mode [ 776.456071][T16586] device sit0 entered promiscuous mode [ 780.767796][T16678] syz.3.4876[16678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 780.767871][T16678] syz.3.4876[16678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 782.013214][T16697] device sit0 left promiscuous mode [ 789.206980][ T28] audit: type=1400 audit(1751751034.394:161): avc: denied { create } for pid=16834 comm="syz.3.4929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 790.153163][T16867] syz.3.4937[16867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.153236][T16867] syz.3.4937[16867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 791.500808][ T28] audit: type=1400 audit(1751751036.684:162): avc: denied { create } for pid=16889 comm="syz.4.4944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 794.271501][T17021] syz.4.4986[17021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.271584][T17021] syz.4.4986[17021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 796.150240][T17058] device veth0_vlan left promiscuous mode [ 796.414479][T17058] device veth0_vlan entered promiscuous mode [ 796.543242][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 796.562704][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 796.602974][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 804.302244][T17171] device veth0_vlan left promiscuous mode [ 804.328551][T17171] device veth0_vlan entered promiscuous mode [ 804.451762][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 804.474180][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 804.487493][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 808.907030][T17254] device syzkaller0 entered promiscuous mode [ 810.715318][T17288] device veth0_vlan left promiscuous mode [ 810.771717][T17288] device veth0_vlan entered promiscuous mode [ 810.911817][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 810.941079][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 811.013524][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 812.540807][T17348] device sit0 entered promiscuous mode [ 817.168315][T17430] device sit0 left promiscuous mode [ 817.752554][T17429] device sit0 entered promiscuous mode [ 818.758935][T17457] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.766195][T17457] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.938069][T17457] device bridge_slave_1 left promiscuous mode [ 818.966220][T17457] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.193239][T17457] device bridge_slave_0 left promiscuous mode [ 819.210243][T17457] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.525440][T17469] device sit0 left promiscuous mode [ 819.781819][T17479] FAULT_INJECTION: forcing a failure. [ 819.781819][T17479] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 819.931047][T17479] CPU: 1 PID: 17479 Comm: syz.8.5133 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 819.940981][T17479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 819.951037][T17479] Call Trace: [ 819.954313][T17479] [ 819.957236][T17479] __dump_stack+0x21/0x24 [ 819.961574][T17479] dump_stack_lvl+0xee/0x150 [ 819.966169][T17479] ? __cfi_dump_stack_lvl+0x8/0x8 [ 819.971194][T17479] ? has_cap_mac_admin+0x330/0x330 [ 819.976303][T17479] dump_stack+0x15/0x24 [ 819.980460][T17479] should_fail_ex+0x3d4/0x520 [ 819.985137][T17479] should_fail+0xb/0x10 [ 819.989288][T17479] should_fail_usercopy+0x1a/0x20 [ 819.994311][T17479] _copy_from_user+0x1e/0xc0 [ 819.998893][T17479] get_user_ifreq+0x6c/0x180 [ 820.003482][T17479] sock_ioctl+0x630/0x6e0 [ 820.007810][T17479] ? __cfi_sock_ioctl+0x10/0x10 [ 820.012662][T17479] ? security_file_ioctl+0x95/0xc0 [ 820.017773][T17479] ? __cfi_sock_ioctl+0x10/0x10 [ 820.022621][T17479] __se_sys_ioctl+0x12f/0x1b0 [ 820.027302][T17479] __x64_sys_ioctl+0x7b/0x90 [ 820.031889][T17479] x64_sys_call+0x58b/0x9a0 [ 820.036391][T17479] do_syscall_64+0x4c/0xa0 [ 820.040803][T17479] ? clear_bhb_loop+0x30/0x80 [ 820.045476][T17479] ? clear_bhb_loop+0x30/0x80 [ 820.050150][T17479] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 820.056042][T17479] RIP: 0033:0x7f649a38e929 [ 820.060458][T17479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 820.080066][T17479] RSP: 002b:00007f649b232038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 820.088484][T17479] RAX: ffffffffffffffda RBX: 00007f649a5b6080 RCX: 00007f649a38e929 [ 820.096459][T17479] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 820.104426][T17479] RBP: 00007f649b232090 R08: 0000000000000000 R09: 0000000000000000 [ 820.112397][T17479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.120366][T17479] R13: 0000000000000000 R14: 00007f649a5b6080 R15: 00007fff11b3e918 [ 820.128339][T17479] [ 823.435987][T17563] syz.7.5165[17563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 823.438787][T17563] syz.7.5165[17563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 825.951711][T17633] GPL: port 2(gretap0) entered blocking state [ 826.143315][T17633] GPL: port 2(gretap0) entered disabled state [ 826.149887][T17633] device gretap0 entered promiscuous mode [ 826.161684][T17633] GPL: port 2(gretap0) entered blocking state [ 826.167786][T17633] GPL: port 2(gretap0) entered forwarding state [ 826.894393][ T28] audit: type=1400 audit(1751751072.084:163): avc: denied { create } for pid=17641 comm="syz.8.5188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 827.770013][T17657] ÿÿÿÿÿÿ: renamed from vlan1 [ 832.191661][T17742] GPL: port 1(gretap0) entered blocking state [ 832.239477][T17742] GPL: port 1(gretap0) entered disabled state [ 832.311591][T17742] device gretap0 entered promiscuous mode [ 834.000403][T17773] ÿÿÿÿÿÿ: renamed from vlan1 [ 834.554823][T17784] syz.6.5229[17784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 834.554897][T17784] syz.6.5229[17784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 837.686691][T17833] device syzkaller0 entered promiscuous mode [ 838.231971][T17848] device veth1_macvtap left promiscuous mode [ 841.004978][T17919] FAULT_INJECTION: forcing a failure. [ 841.004978][T17919] name failslab, interval 1, probability 0, space 0, times 0 [ 841.080854][T17919] CPU: 0 PID: 17919 Comm: syz.6.5268 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 841.090787][T17919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 841.100846][T17919] Call Trace: [ 841.104117][T17919] [ 841.107046][T17919] __dump_stack+0x21/0x24 [ 841.111381][T17919] dump_stack_lvl+0xee/0x150 [ 841.115974][T17919] ? __cfi_dump_stack_lvl+0x8/0x8 [ 841.121009][T17919] ? __kasan_check_write+0x14/0x20 [ 841.126124][T17919] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 841.131586][T17919] dump_stack+0x15/0x24 [ 841.135746][T17919] should_fail_ex+0x3d4/0x520 [ 841.140419][T17919] __should_failslab+0xac/0xf0 [ 841.145181][T17919] ? kvmalloc_node+0x294/0x480 [ 841.149950][T17919] should_failslab+0x9/0x20 [ 841.154451][T17919] __kmem_cache_alloc_node+0x3d/0x2c0 [ 841.159820][T17919] ? kvmalloc_node+0x294/0x480 [ 841.164579][T17919] __kmalloc_node+0xa1/0x1e0 [ 841.169167][T17919] kvmalloc_node+0x294/0x480 [ 841.173758][T17919] ? __cfi_kvmalloc_node+0x10/0x10 [ 841.178870][T17919] alloc_netdev_mqs+0x8d/0xf90 [ 841.183632][T17919] ? __cfi_ip6_tnl_dev_setup+0x10/0x10 [ 841.189086][T17919] ? dev_valid_name+0x227/0x310 [ 841.193947][T17919] ? ip6_tnl_locate+0x5a1/0x790 [ 841.198794][T17919] ip6_tnl_locate+0x604/0x790 [ 841.203470][T17919] ? sysvec_call_function_single+0x61/0xc0 [ 841.209274][T17919] ? asm_sysvec_call_function_single+0x1b/0x20 [ 841.215424][T17919] ? ip6_tnl_link_config+0xa00/0xa00 [ 841.220706][T17919] ? ip6_tnl_siocdevprivate+0x45f/0xe30 [ 841.226262][T17919] ? memcpy+0x56/0x70 [ 841.230254][T17919] ip6_tnl_siocdevprivate+0x696/0xe30 [ 841.235627][T17919] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 841.241525][T17919] ? full_name_hash+0x9d/0xf0 [ 841.246211][T17919] dev_ifsioc+0xbc4/0xed0 [ 841.250558][T17919] ? ioctl_has_perm+0x391/0x4c0 [ 841.255409][T17919] ? dev_ioctl+0xd10/0xd10 [ 841.259823][T17919] ? __kasan_check_write+0x14/0x20 [ 841.264936][T17919] ? mutex_lock+0x8d/0x1a0 [ 841.269349][T17919] ? __cfi_mutex_lock+0x10/0x10 [ 841.274196][T17919] ? dev_get_by_name_rcu+0xe5/0x130 [ 841.279395][T17919] dev_ioctl+0x5f3/0xd10 [ 841.283636][T17919] sock_ioctl+0x675/0x6e0 [ 841.287959][T17919] ? __cfi_sock_ioctl+0x10/0x10 [ 841.292807][T17919] ? security_file_ioctl+0x95/0xc0 [ 841.297912][T17919] ? __cfi_sock_ioctl+0x10/0x10 [ 841.302758][T17919] __se_sys_ioctl+0x12f/0x1b0 [ 841.307439][T17919] __x64_sys_ioctl+0x7b/0x90 [ 841.312030][T17919] x64_sys_call+0x58b/0x9a0 [ 841.316541][T17919] do_syscall_64+0x4c/0xa0 [ 841.320945][T17919] ? clear_bhb_loop+0x30/0x80 [ 841.325620][T17919] ? clear_bhb_loop+0x30/0x80 [ 841.330293][T17919] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 841.336179][T17919] RIP: 0033:0x7fe764d8e929 [ 841.340590][T17919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.360199][T17919] RSP: 002b:00007fe765bfe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.368625][T17919] RAX: ffffffffffffffda RBX: 00007fe764fb5fa0 RCX: 00007fe764d8e929 [ 841.376605][T17919] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 841.384579][T17919] RBP: 00007fe765bfe090 R08: 0000000000000000 R09: 0000000000000000 [ 841.392555][T17919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.400530][T17919] R13: 0000000000000000 R14: 00007fe764fb5fa0 R15: 00007fffb5369848 [ 841.408509][T17919] [ 841.693220][T17925] device pim6reg1 entered promiscuous mode [ 843.872832][T17966] syz.7.5286[17966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 843.872906][T17966] syz.7.5286[17966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.206384][T17961] device veth1_macvtap left promiscuous mode [ 844.268044][T17961] device macsec0 left promiscuous mode [ 844.376383][T17971] device veth1_macvtap entered promiscuous mode [ 844.461850][T17971] device macsec0 entered promiscuous mode [ 849.072246][T18090] FAULT_INJECTION: forcing a failure. [ 849.072246][T18090] name failslab, interval 1, probability 0, space 0, times 0 [ 849.170904][T18090] CPU: 1 PID: 18090 Comm: syz.8.5326 Not tainted 6.1.141-syzkaller-00036-g7011769d221c #0 [ 849.180843][T18090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 849.190901][T18090] Call Trace: [ 849.194177][T18090] [ 849.197102][T18090] __dump_stack+0x21/0x24 [ 849.201439][T18090] dump_stack_lvl+0xee/0x150 [ 849.206034][T18090] ? __cfi_dump_stack_lvl+0x8/0x8 [ 849.211059][T18090] ? x64_sys_call+0x58b/0x9a0 [ 849.215744][T18090] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 849.221810][T18090] dump_stack+0x15/0x24 [ 849.225965][T18090] should_fail_ex+0x3d4/0x520 [ 849.230636][T18090] __should_failslab+0xac/0xf0 [ 849.235396][T18090] ? __hw_addr_add_ex+0x1f7/0x770 [ 849.240426][T18090] should_failslab+0x9/0x20 [ 849.244945][T18090] __kmem_cache_alloc_node+0x3d/0x2c0 [ 849.250314][T18090] ? __hw_addr_add_ex+0x1f7/0x770 [ 849.255339][T18090] kmalloc_trace+0x29/0xb0 [ 849.259761][T18090] __hw_addr_add_ex+0x1f7/0x770 [ 849.264616][T18090] ? kvmalloc_node+0x294/0x480 [ 849.269380][T18090] dev_addr_init+0x138/0x210 [ 849.273968][T18090] ? __kasan_check_write+0x14/0x20 [ 849.279075][T18090] ? __cfi_dev_addr_init+0x10/0x10 [ 849.284176][T18090] alloc_netdev_mqs+0x296/0xf90 [ 849.289013][T18090] ? __cfi_ip6_tnl_dev_setup+0x10/0x10 [ 849.294467][T18090] ip6_tnl_locate+0x604/0x790 [ 849.299131][T18090] ? cap_capable+0x1aa/0x230 [ 849.303708][T18090] ? ip6_tnl_link_config+0xa00/0xa00 [ 849.308988][T18090] ? memcpy+0x56/0x70 [ 849.312957][T18090] ip6_tnl_siocdevprivate+0x696/0xe30 [ 849.318317][T18090] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 849.324199][T18090] ? full_name_hash+0x9d/0xf0 [ 849.328868][T18090] dev_ifsioc+0xbc4/0xed0 [ 849.333183][T18090] ? ioctl_has_perm+0x391/0x4c0 [ 849.338026][T18090] ? dev_ioctl+0xd10/0xd10 [ 849.342439][T18090] ? __kasan_check_write+0x14/0x20 [ 849.347556][T18090] ? mutex_lock+0x8d/0x1a0 [ 849.351965][T18090] ? __cfi_mutex_lock+0x10/0x10 [ 849.356801][T18090] ? dev_get_by_name_rcu+0xe5/0x130 [ 849.361989][T18090] dev_ioctl+0x5f3/0xd10 [ 849.366218][T18090] sock_ioctl+0x675/0x6e0 [ 849.370535][T18090] ? __cfi_sock_ioctl+0x10/0x10 [ 849.375372][T18090] ? security_file_ioctl+0x95/0xc0 [ 849.380471][T18090] ? __cfi_sock_ioctl+0x10/0x10 [ 849.385306][T18090] __se_sys_ioctl+0x12f/0x1b0 [ 849.389971][T18090] __x64_sys_ioctl+0x7b/0x90 [ 849.394547][T18090] x64_sys_call+0x58b/0x9a0 [ 849.399035][T18090] do_syscall_64+0x4c/0xa0 [ 849.403434][T18090] ? clear_bhb_loop+0x30/0x80 [ 849.408097][T18090] ? clear_bhb_loop+0x30/0x80 [ 849.412754][T18090] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 849.418629][T18090] RIP: 0033:0x7f649a38e929 [ 849.423025][T18090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 849.442613][T18090] RSP: 002b:00007f649b253038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 849.451012][T18090] RAX: ffffffffffffffda RBX: 00007f649a5b5fa0 RCX: 00007f649a38e929 [ 849.458965][T18090] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 849.466917][T18090] RBP: 00007f649b253090 R08: 0000000000000000 R09: 0000000000000000 [ 849.474868][T18090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 849.482819][T18090] R13: 0000000000000000 R14: 00007f649a5b5fa0 R15: 00007fff11b3e918 [ 849.490777][T18090] [ 851.311013][ T28] audit: type=1400 audit(1751751096.504:164): avc: denied { mounton } for pid=18127 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 851.424020][T18127] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.431397][T18127] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.444178][T18127] device bridge_slave_0 entered promiscuous mode [ 851.451430][T18127] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.458576][T18127] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.466083][T18127] device bridge_slave_1 entered promiscuous mode [ 852.011324][T18127] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.018388][T18127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.025683][T18127] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.032717][T18127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.149839][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 852.185414][T10125] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.260806][T10125] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.370819][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 852.460729][T10125] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.467800][T10125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.497026][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 852.505504][T10125] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.512578][T10125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.752613][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 852.851269][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 852.986507][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 853.014943][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 853.034306][T18127] device veth0_vlan entered promiscuous mode [ 853.095209][T18154] device veth1_macvtap entered promiscuous mode [ 853.102559][T18154] device macsec0 entered promiscuous mode [ 853.170165][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 853.181961][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 853.189137][T18165] syz.3.5347[18165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 853.190137][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 853.190385][T18165] syz.3.5347[18165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 853.209069][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 853.228190][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 853.313869][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 853.324793][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 853.346416][T18127] device veth1_macvtap entered promiscuous mode [ 853.354805][T10125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 853.501766][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 853.533115][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 853.588756][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 853.658256][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 853.736852][ T1823] GPL: port 1(erspan0) entered disabled state [ 853.784864][ T1823] device erspan0 left promiscuous mode [ 853.835254][ T1823] GPL: port 1(erspan0) entered disabled state [ 853.958214][ T28] audit: type=1400 audit(1751751099.144:165): avc: denied { unmount } for pid=18127 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 854.183182][T18197] device sit0 entered promiscuous mode [ 854.823027][ T1823] device veth0_vlan left promiscuous mode [ 862.161219][T18347] device veth1_macvtap left promiscuous mode [ 862.332842][T18349] syz.6.5403[18349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 862.332921][T18349] syz.6.5403[18349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.791246][T18456] syz.3.5436[18456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.904842][T18456] syz.3.5436[18456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.171394][T18474] device pim6reg1 entered promiscuous mode [ 867.233645][ T28] audit: type=1400 audit(1751751112.424:166): avc: denied { create } for pid=18477 comm="syz.8.5443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 872.047933][T18628] syz.6.5496[18628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.048009][T18628] syz.6.5496[18628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 875.359883][T18731] syz.3.5529[18731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 875.376969][T18731] syz.3.5529[18731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.929554][T18899] device syzkaller0 entered promiscuous mode [ 896.412643][ T28] audit: type=1400 audit(1751751141.604:167): avc: denied { create } for pid=19142 comm="syz.3.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 897.622909][T19171] device syzkaller0 entered promiscuous mode [ 899.181344][T19194] bond_slave_1: mtu less than device minimum [ 900.878635][T19275] device veth0_vlan left promiscuous mode [ 900.909338][T19275] device veth0_vlan entered promiscuous mode [ 901.016440][T18184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 901.036846][T18184] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 901.049267][T18184] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.010159][T19323] device syzkaller0 entered promiscuous mode [ 905.670319][T19343] syz.7.5731[19343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 905.670390][T19343] syz.7.5731[19343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 906.541327][T19359] device syzkaller0 entered promiscuous mode [ 913.302073][T19496] device wg2 left promiscuous mode [ 913.342664][T19496] device wg2 entered promiscuous mode [ 916.584609][T19548] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.612530][T19548] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.725743][T19548] device bridge_slave_0 entered promiscuous mode [ 916.930721][T19548] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.971922][T19548] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.997052][T19548] device bridge_slave_1 entered promiscuous mode [ 918.046602][ T1817] device veth1_macvtap left promiscuous mode [ 918.698186][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 918.726958][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 918.820024][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 918.836222][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 918.846531][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.853601][ T1823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 919.130828][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 919.162933][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 919.260917][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 919.360602][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.367681][ T1823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 919.486757][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 919.534087][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 919.740579][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 919.748744][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 919.817996][T19548] device veth0_vlan entered promiscuous mode [ 919.897973][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 919.926456][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 919.991778][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 920.057043][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 920.138153][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 920.209696][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 920.287207][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 920.297935][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 920.422653][T19548] device veth1_macvtap entered promiscuous mode [ 920.567884][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 920.594579][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 920.694391][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 920.804098][T18184] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 920.817002][T18184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 928.962040][T19778] device sit0 entered promiscuous mode [ 933.596030][T19844] device veth0_vlan left promiscuous mode [ 933.648339][T19844] device veth0_vlan entered promiscuous mode [ 933.822155][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 933.839660][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 933.916349][ T1823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 936.380328][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 936.444998][T19914] bridge0: port 1(bridge_slave_0) entered disabled state [ 936.515798][T19914] device bridge_slave_0 entered promiscuous mode [ 936.522937][T19914] bridge0: port 2(bridge_slave_1) entered blocking state [ 936.529973][T19914] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.537453][T19914] device bridge_slave_1 entered promiscuous mode [ 936.915849][T19934] device pim6reg1 entered promiscuous mode [ 937.361040][T19934] device syzkaller0 entered promiscuous mode [ 937.668712][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 937.679592][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 937.903673][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 937.925130][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 937.943583][ T1832] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.950664][ T1832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 937.958141][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 937.991056][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 938.008311][ T1832] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.015396][ T1832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.114352][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 938.130785][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 938.139101][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 938.149322][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 938.229819][T19955] device veth0_vlan left promiscuous mode [ 938.258029][T19955] device veth0_vlan entered promiscuous mode [ 938.410575][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 938.444890][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 938.524629][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 938.589033][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 938.648273][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 938.788939][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 938.851112][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 938.921117][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 938.993526][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 939.034498][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 939.061560][T19914] device veth0_vlan entered promiscuous mode [ 939.347198][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 939.373303][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 939.655376][T19914] device veth1_macvtap entered promiscuous mode [ 939.873284][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 939.901111][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 940.010085][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 940.029324][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 940.040992][ T1832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 940.300216][T18184] device bridge_slave_1 left promiscuous mode [ 940.310329][T18184] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.343345][T18184] device bridge_slave_0 left promiscuous mode [ 940.379878][T18184] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.404123][T18184] device veth0_vlan left promiscuous mode [ 941.741404][T18184] device bridge_slave_1 left promiscuous mode [ 941.747560][T18184] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.820885][T18184] device bridge_slave_0 left promiscuous mode [ 941.827041][T18184] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.901841][T18184] device veth1_macvtap left promiscuous mode [ 941.907929][T18184] device veth0_vlan left promiscuous mode